<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC7011 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7011.xml">
<!ENTITY RFC8986 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8986.xml">
<!ENTITY RFC9315 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9315.xml">
<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY I-D.irtf-nmrg-network-digital-twin-arch SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.irtf-nmrg-network-digital-twin-arch.xml">
]>


<rfc ipr="trust200902" docName="draft-irtf-nmrg-ai-challenges-02" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Coupling AI and network management">Research Challenges in Coupling Artificial Intelligence and Network Management</title>

    <author fullname="Jérôme François">
      <organization>University of Luxembourg and Inria</organization>
      <address>
        <postal>
          <street>6 Rue Richard Coudenhove-Kalergi</street>
          <city>Luxembourg</city>
          <country>Luxembourg</country>
        </postal>
        <email>jerome.francois@uni.lu</email>
      </address>
    </author>
    <author fullname="Alexander Clemm">
      <organization>Futurewei Technologies, Inc.</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>ludwig@clemm.org</email>
      </address>
    </author>
    <author fullname="Dimitri Papadimitriou">
      <organization>3NLab Belgium Reseach Center</organization>
      <address>
        <postal>
          <city>Leuven</city>
          <country>Belgium</country>
        </postal>
        <email>papadimitriou.dimitri.be@gmail.com</email>
      </address>
    </author>
    <author fullname="Stenio Fernandes">
      <organization>Central Bank of Canada</organization>
      <address>
        <postal>
          <country>Canada</country>
        </postal>
        <email>stenio.fernandes@ieee.org</email>
      </address>
    </author>
    <author fullname="Stefan Schneider">
      <organization>Digital Railway (DSD) at Deutsche Bahn</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>stefanbschneider@outlook.com</email>
      </address>
    </author>

    <date year="2024" month="January" day="10"/>

    
    <workgroup>Internet Research Task Force</workgroup>
    <keyword>network management</keyword> <keyword>artificial intelligence</keyword> <keyword>machine learning</keyword>

    <abstract>


<t>This document is intended to introduce the challenges to overcome when Network Management (NM) problems may require to couple with Artificial Intelligence (AI) solutions. On the one hand, there are many difficult problems in NM that to this date have no good solutions, or where any solutions come with significant limitations and constraints. Artificial Intelligence may help produce novel solutions to those problems. On the other hand, for several reasons (computational costs of AI solutions, privacy of data), distribution of AI tasks became primordial. It is thus also expected that network are operated efficiently to support those tasks.</t>

<t>To identify the right set of challenges, the document defines a method based on the evolution and nature of NM problems. This will be done in parallel with advances and the nature of existing solutions in AI in order to highlight where AI and NM have been already coupled together or could benefit from a higher integration. So, the method aims at evaluating the gap between NM problems and AI solutions. Challenges are derived accordingly, assuming solving these challenges will help to reduce the gap between NM and AI.</t>



    </abstract>



  </front>

  <middle>


<section anchor="intro"><name>Introduction</name>

<t>The functional scope of Network Management (NM) is very large, ranging from monitoring to accounting, from network provisioning to service diagnostics, from usage accounting to security. The taxonomy defined in <xref target="Hoo18"/> extends the traditional Fault, Configuration, Accounting, Performance, Security (FCAPS) domains by considering additional functional areas but above all by promoting additional views. For instance, network management approaches can be classified according to the technologies, methods or paradigms they will rely on. Methods include common approaches as for example mathematical optimization or queuing theory but also techniques which have been widely applied in last decades like game theory, data analysis, data mining and machine learning. In management paradigms, autonomic and cognitive management are listed. As highlighted by this taxonomy, the definition of automated and more intelligent techniques have been promoted to support efficient network management operations. Research in NM and more generally in networking has been very active in the area of applied ML <xref target="Bou18"/>.</t>

<t>However, for maintaining network operational in pre-defined safety bounds, NM still heavily relies on established procedures. Even after several cycles of adding automation, those procedures are still mostly fixed and set offline in the sense that the exact control loop and all possible scenarios are defined in advance. They are so mostly deterministic by nature or or at least with sufficient safety margin. Obviously, there have been a lot of propositions to make network smarter or intelligent with the use of Machine Learning (ML) but without large adoption for running real networks because it changes the paradigms towards stochastic methods.</t>

<t>ML includes regression analysis, statistical learning (SVM and variants), deep learning (ANN and variants), reinforcement learning, etc. It is a sub-area of Artificial Intelligence (AI) that concentrates the focus nowadays but AI encompasses other areas including knowledge representation, inductive logic programming, inference rule engine or by extension the techniques that allow to observe and perform actions on a system.</t>

<t>It is thus legitimate to question if ML or AI in general could be helpful for NM in regards to practical deployment. This question is actually tight with the problems the NM aims to address. Independently of NM, ML-based solutions were introduced to solve one type of problems in an approximate way which are very complex in nature, i.e. finding an optimal solution is not possible (in polynomial time). This is the case for NP-hard problems. In those cases, solutions typically rely on heuristics that may not yield optimal results, or algorithms that run into issues with scalability and the ability to produce timely results due to the exponential search space. In NM, those problems exist, for instance allocation of resources in case of Service Function Chaining (SFC) or network slicing  among others are recent examples which have gained interest in our community with SDN. Many propositions consist of modeling the optimization problem as an MILP (Mixed-Integer Linear Programming) and solve it by means of heuristics to reach a satisfactory tradeoff between solution quality (gap to optimality) - computation time and model size/dimensionality. Hence, ML is recognized to be well adapted to progress on this type of problem <xref target="Kaf19"/>.</t>

<t>However, all computational problems of NM are not NP-hard. Due to real-time constraints, some involve very short control loops that require both rapid decisions and the ability to rapidly adapt to new situations and different contexts. So, even in that case, time is critical and approximate solutions are usually more acceptable.  Again, it is where AI can be beneficial. Actually, expert systems are AI systems <xref target="Ste92"/> but this kind of systems are not designed to scale with the volume and heterogeneity of data we can collect in a network today for which the expert system is built thanks to numerous inference rules. In contrast, ML is more efficient to automatically learn abstract representations of the rules, which can be eventually updated.</t>

<t>On one hand another type of common problem in NM is classification. For instance, classifying network flows is helpful for security purposes to detect attack flows, to differentiate QoS among the different flows (e.g. real-time streams which need to be prioritized), etc. On the other hand, ML-based classification algorithms have been widely used in literature with high quality results when properly applied leading to their applications in commercial products. There are many algorithms including decision tress, support vector machine or (deep) neural networks which have been to be proven efficient in many areas and notably for image and natural language processing.</t>

<t>Finally, many problems also still rely on humans in the loop, from support issues such as dealing with trouble tickets to planning activities for the roll-out of new services. This creates operational bottlenecks and is often expensive and error prone. This kind of tasks could be either automated or guided by an AI system to avoid inividual human bias. It is worth noting that Ml relying training data generated by human can also suffer indirectly from a collective human bias. Indeed, the balance between human resources and the complexity of problems to deal with is actually very imbalanced and this will continue to increase due to the size of networks, heterogeneity of devices, services, etc. Hence, human-based procedures tend to be simple in comparison to the problems to solve or time-consuming. Notable examples are in security where the network operator should defend against potential unknown threat. As a result, services might be largely affected during hours</t>

<t>Actually, all the problems aforementioned are exacerbated by the situation of more complex networks to operate on many dimensions (users, devices, services, connections, etc.). Therefore, AI is expected to enable or simplify the solving of those problems in real networks in the near future <xref target="czb20"/> <xref target="Yan20"/> because those would require reaching unprecedented levels of performance in terms of throughput, latency, mobility, security, etc.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="acronyms"><name>Acronyms</name>

<t><list style="symbols">
  <t>AI: Artificial Intelligence</t>
  <t>FL: Federated Learning</t>
  <t>GAN: Generative Adversarial Network</t>
  <t>GNN: Graph Neural Network</t>
  <t>IBN: Intent-Based Networking</t>
  <t>LSTM: Long Short-Term Memory</t>
  <t>ML: Machine Learning</t>
  <t>MILP: Mixed-Integer Linear Programming</t>
  <t>MLP: Multilayer Perceptron</t>
  <t>NM: Network Management</t>
  <t>RL: Reinforcement Learning</t>
  <t>SFC: Service Function Chaining</t>
  <t>SVM: Support-Vector Machine</t>
  <t>VNF: Virtual Network Function</t>
</list></t>

</section>
<section anchor="pbNM"><name>Difficult problems in network management</name>

<t>As mentioned in introduction, problems to be tackled in NM tend to be complex and exhibit characteristics that make them candidates for solutions that involve AI techniques:</t>

<t><list style="symbols">
  <t>C1: A very large solution space, combinatorially exploding with the size of the problem domain. This makes it impractical to explore and test every solution (again NP-hard problems here)</t>
  <t>C2: Uncertainty and unpredictability along multiple dimensions, including the context in which the solution is applied, behavior of users and traffic, lack of visibility into network state, and more.  In addition, many networks do not exist in isolation but are subjected to myriads of interdependencies, some outside their control.  Accordingly, there are many external parameters that affect the efficiency of the solution to a problem and that cannot be known in advance: user activity, interconnected networks, etc.</t>
  <t>C3: The need to provide answers (i.e. compute solutions, deliver verdicts, make decisions)  in constrained or deterministic time. In many cases, context changes dynamically and decisions need to be made quickly to be of use.</t>
  <t>C4: Data-dependent solutions. To solve a problem accurately, it can be necessary to rely on large volumes of data, having to deal with issues that range from data heterogeneity to incomplete data to general challenges of dealing with high data velocity.</t>
  <t>C5: Need to be integrated with existing automatic and human processes.</t>
  <t>C6: Solutions <bcp14>MUST</bcp14> be cost-effective as resources (bandwidth, CPU, human, etc.) can be limited, notably when part of processing is distributed at the network edge or within the network.</t>
</list></t>

<t>Many decision/optimization problems are affected by multiple criteria. Below is a non-exhaustive list of complex NM problems for which AI and/or non-AI-based approaches have been proposed:</t>

<t><list style="symbols">
  <t>Computation of optimal paths: Packet forwarding is not always based on traditional routing protocols with least cost routing, but on computation of paths that are optimized for certain criteria - for example, to meet certain level objectives, to result in greater resilience, to balance utilization, to optimize energy usage, etc.  Many of those solutions can be found in SDN, where a controller or path computation element computes paths that are subsequently provisioned across the network.  However, such solutions generally do not scale to millions of paths (C1), and cannot be recomputed in sub-second time scales (C3) to take into account dynamically changing network conditions (C2). To compute those paths,  operations research techniques have been extensively used in literature along with AI methods as shown in <xref target="Lop20"/>. As such, this problem can be considered as close to big data problems with some of the different Vs: volume, velocity, variety, value…</t>
  <t>Classification of network traffic: Without loss of generality a common objective of network monitoring for operators is to know the type of traffic going through their networks (web, streaming, gaming, VoIP). By nature, this task analyzes data (C4) which can vary over time (C2) except in very particular scenarios like industrial isolated networks. However, the output of the classification technique is time-constrained only in specific cases where fast decisions <bcp14>MUST</bcp14> be made, for example to reroute traffic. Simple identification based on IANA-assigned TCP/UDP ports numbers were sufficient in the past. However, with applications using dynamic port numbers, signature techniques can be used to match packet payload <xref target="Sen04"/>. To handle applications now encapsulated in encrypted web or VPN traffic, machine-learning has been leveraged <xref target="Bri19"/>.</t>
  <t>Network diagnostics: Disruptions of networking services can have many causes and thus can rely on analyzing many sources of data (C4). Identifying the root cause can be of high importance when what is causing the disruption is not properly understood, so that repair actions can address the root cause versus just working around the symptoms. Such repair actions may involve human actions (C5). Further complicating the matter are scenarios in which disruptions are not “hard” but involve only a degradation of service level, and where disruptions are intermittent, not reproducible, and hard to predict.  Artificial intelligence techniques can offer promising solutions.</t>
  <t>Intent-Based Networking (IBN): Roughly speaking, IBN refers to the ability to manage  networks by articulating desired outcomes without the need to specify a course of actions to achieve those outcomes <xref target="RFC9315"/>.  The ability to determine such courses of actions, in particular in scenarios with multiple interdependencies, conflicting goals, large scale, and highly complex and dynamic environments is a huge and largely unsolved challenge (C1, C2, C3).  Artificial Intelligence techniques can be of help here in multiple ways, from accurately classifying dynamic context to determine matching actions to reframing the expression of intent as a game that can be played (and won) using artificially intelligent techniques.</t>
  <t>VNF (Virtual Network Function) placement and SFC design: VNFs need to be placed on physical resources and Service Function Chains designed in an optimized manner to avoid use of networking resources and minimize energy usage (C1,C6).</t>
  <t>Smart admission control to avoid congestion and oversubscription of network resources: Admission control needs to be set up and performed in ways that ensure service levels are optimized in a manner that is fair and aligned with application needs, congestion avoided or its effects mitigated (C6).</t>
</list></t>

</section>
<section anchor="hlchallenges"><name>High-level challenges in adopting AI in NM</name>

<t>As shown in the previous section, AI techniques are good candidates for the difficult NM problems. There have been many propositions but still most of them remain at the level of prototypes or have been only evaluated with simulation and/or emulation. It is thus questionable why our community investigates much research in this direction but has not adopted those solutions to operate real networks. There are different obstacles.</t>

<t>First, AI advances have been historically driven by the image/video, natural language and signal processing communities as well as robotics for many decades. As a result, the most impressive applications are in this area including recently the generalization of home assistants or the large progress in autonomous vehicles. However, the network experts have been focused on building the Internet, especially building protocols to make the world interconnected and with always better performance and services. This trend continues today with the 5G networks in deployment and beyond 5G under definition. Hence, AI was not the primary focus even if increased network automation calls for AI and ML solutions. However, AI is now considered as a core enabler for the future 6G networks which are sometimes qualified as AI-native networks.</t>

<t>While we can see major contributions in AI-based solutions for networking over more than two decades, only a fraction of the community was concerned by AI at that time. Progress as a whole, from a community perspective, was so limited and compensated by relying on the development of AI in the communities as mentioned earlier. Even if our problems share some commonalities, for example on the volume of data to analyze, there are many differences: data types are completely different, networks are by nature heavily distributed, etc. If problems are different, they <bcp14>SHOULD</bcp14> require distinct solutions. In a nutshell, network-tailored AI was overlooked and leads to a first set of challenges described in <xref target="AItechniques"></xref>.</t>

<t>Second, many AI techniques require enough representative data to be applied independently if the algorithms are supervised or unsupervised. NM has produced a lot of methods and technologies to acquire data. However, in most cases, the goal was not to support AI techniques and lead so to a mismatch. For example, (deep) learning techniques mostly rely on having vectors of (real) numbers as input which fits some metrics (packet/byte counts, latency, delays, etc)  but needs some adjustment for categorical (IP addresses, port numbers, etc) or topological features. Conversions are usually applied using common techniques like one-hot encoding or by coarse-grained representations <xref target="Sco11"/>. However, more advanced techniques have been recently proposed to embed representation of network entities rather than pure encoding <xref target="Rin17"/><xref target="Evr19"/><xref target="Sol20"/>.</t>

<t>An additional challenge concerns the fact that AI techniques that involve analysis of networking data can also lead to the extraction of sensitive and personally-identifiable information, raising potential privacy concerns and concerns regarding the potential for abuse. For example, AI techniques used to analyze encrypted network traffic with the legitimate goal to protect the network from intrusions and illegitimate attack traffic could be used to infer information about network usage and interactions of network users.  Intelligent data analysis and the need to maintain privacy are in many ways that are contradictory in nature, resulting in an arms race.  Similarly, training ML solutions on real network data is in many cases preferable over using less-realisitic synthetic data sets. However, network data may contain private or sensitive data, the sharing of which may be problematic from a privacy standpoint and even result in legal exposure. The challenge concerns thus how to allow AI techniques to perform legitimate network management functions and provide network owners with operational insights into what is going on in their networks, while prohibiting their potential for abuse for other (illegitimate) purposes.  Challenges related to network data as input to ML algorithms is detailed in <xref target="netData"></xref>.</t>

<t>Finally, networks are already operated thanks to (semi-)automated procedures involving a large number of resources which are synchronized with management or orchestration tools. Adding AI supposes it would be seamlessly integrated within pre-existing processes. Although the goal of these procedures might be solely to provide relevant information to operators through alerts or dashboards in case of monitoring applications, many other applications rely on those procedures to trigger actions on the different resources, which can be local or remote. The use of AI or any other approaches to derive NM actions adds further constraint on them, especially regarding time constraints and synchronization to maintain a coherence over a distributed system.</t>

<t>A related challenge concerns the fact that to be deployed, a solution needs to not only provide a technical solution but to also be acceptable to users - in this case, network administrators and operators.  One challenge with automated solutions concerns that users want to feel “in control” and able to understand what is going on, even more so if ultimately those users are the ones who are held accountable for whether or not the network is running smoothly.  Those same concerns extend to artificially intelligent systems for obvious reasons. To mitigate those concerns, aspects such as the ability to explain actions that are taken - or about to be taken - by AI systems become important.</t>

<t>Beyond reasons of making users more comfortable, there are potentially also legal or regulatory ramifications to ensure that actions taken are properly understood.  For example,agencies such as the FCC may impose fines on network operators when services such as E911 experience outages, as there is a public interest in ensuring highest availability for such services.  In investigating causes for such outages, the underlying behavior of systems has to be properly understood, and even more so the reasons for actions that fall under the realm of network operations. All these aspects about integration and acceptability of the integration of AI in NM processes is detailed in <xref target="acceptability"></xref>.</t>

</section>
<section anchor="AItechniques"><name>AI techniques and network management</name>

<section anchor="problem-type-and-mapping"><name>Problem type and mapping</name>

<t>In the last few years, an increasing number of different AI techniques have been proposed and applied successfully to a growing variety of different problems in different domains, including network management <xref target="Mus18"/>, <xref target="Xie18"/>. Some of the more recently proposed AI approaches are clearly advancements of older approaches, which they supersede. Many other AI approaches are not predecessors or successors but simply complementary because they are useful for different problems or optimize different metrics. In fact, different AI approaches are useful for different kinds of problem inputs (e.g., tabular data vs. text vs. images vs. time series) and also for different kinds of desired outputs (e.g., a predicted value, a classification, or an action). Similarly, there may be trade-offs between multiple approaches that take the same kind of inputs and desired outputs (e.g., in terms of desired objective, computation complexity, constraints).</t>

<t>Overall, it is a key challenge of using AI for network management to properly understand and map which kind of problems with which inputs, outputs, and objectives are best solved with which kind of AI (or non-AI) approaches. Given the wealth of existing and newly released AI approaches, this is far from a trivial task.</t>

<section anchor="sub-challenge-suitable-approach-for-given-input"><name>Sub-challenge: Suitable Approach for Given Input</name>

<t>Different problems in network management come with widely different problem parameters. For example, security-related problems may have large amounts of text or encrypted data as input, whereas forecasting problems have historical time series data as input. They also vary in the amount of available data.</t>

<t>Both the type and amount of data influences which AI techniques could be useful. On one hand, in scenarios with little data, classical machine learning techniques (e.g., SVM, tree-based approaches, etc.) are often sufficient and even superior to neural networks. On the other hand, neural networks have the advantage of learning complex models from large amounts of data without requiring feature engineering. Here, different neural network architectures are useful for different kinds of problems. The traditional and simplest architecture are (fully connected) multi-layer perceptrons (MLPs), which are useful for structured, tabular data. For images, videos, or other high-dimensional data with correlation between “close” features, convolutional neural networks (CNNs) are useful. Recurrent neural networks (RNNs), especially LSTMs, and attention-based neural networks (transformers) are great for sequential data like time series or text. Finally, Graph Neural Networks (GNNs) can incorporate and consider the graph-structured input, which is very useful in network management, e.g., to represent the network topology.</t>

<t>The aforementioned rough guidelines can help identify a suitable AI approach and neural network architecture. Still, best results are often only achieved with sophisticated combinations of different approaches. For example, multiple elements can be combined into one architecture, e.g., with both CNNs and LSTMs, and multiple separate AI approaches can be used as an ensemble to combine their strengths. Here, simplifying the mapping from problem type and input to suitable AI approaches and architectures is clearly an open challenge. Future work <bcp14>SHOULD</bcp14> address this challenge by providing both clearer guidelines and striving for more general AI approaches that can easily be applied to a large variety of different problem inputs.</t>

</section>
<section anchor="sub-challenge-suitable-approach-for-desired-output"><name>Sub-challenge: Suitable Approach for Desired Output</name>

<t>Similar to the challenge of identifying suitable AI approaches for a given problem input, the desired output for a given problem also affects which AI approach <bcp14>SHOULD</bcp14> be chosen. Here, the format of the desired output (single value, class, action, etc.), the frequency of these outputs and their meaning <bcp14>SHOULD</bcp14> be considered.</t>

<t>Again, there are rough guidelines for identifying a group of suitable AI approaches. For example, if a single value is required (e.g., the amount of resources to allocate to a service instance), then typical supervised regression approaches <bcp14>SHOULD</bcp14> be used. If classification (e.g., of malware or another security issue <xref target="Abd10"/>) instead of a value is desired, supervised classification methods <bcp14>SHOULD</bcp14> be used. Alternatively, unsupervised machine learning can help to cluster given data into separate groups, which can be useful to analyze networking data, e.g., for better understanding different types of traffic or user segments.</t>

<t>In addition to these classical supervised and unsupervised methods, reinforcement learning approaches allow active, sequential decisions rather than simple predictions or classifications. This is often useful in network management, e.g., to actively control service scaling and placement as well as flow scheduling and routing. Reinforcement learning agents autonomously select suitable actions in a given environment and are especially useful for self-learning network management. In addition to model-free reinforcement learning, model-based planning approaches (e.g., Monte Carlo Tree Search (MCTS)) also allow choosing suitable actions in a given environment but require full knowledge of the environment dynamics. In contrast, model-free reinforcement learning is ideal for scenarios with unknown environment dynamics, which is often the case in network management.</t>

<t>Similar to the previous sub-challenge, these are just rough guidelines that can help to select a suitable group of AI approaches. Identifying the most suitable approach within the group, e.g., the best out of the many existing reinforcement learning approaches, is still challenging. And, as before, different approaches could be combined to enable even more effective network management (e.g., heuristics + RL, LSTMs + RL, …). Here, further research <bcp14>MAY</bcp14> simplify the mapping from desired problem output to choosing or designing a suitable AI approach.</t>

</section>
<section anchor="tailoringAI"><name>Sub-challenge: Tailoring the AI Approach to the Given Problem</name>

<t>After addressing the two aforementioned sub-challenges, one may have selected a useful kind of AI approach for the given input and output of a network management problem. For example, one may select regression and supervised learning to forecast upcoming network traffic. Or select reinforcement learning to continuously control network and service coordination (scaling, placement, etc.). However, even within each of these fields (regression, reinforcement learning, etc.), there are many possible algorithms and hyperparameters to consider. Selecting a suitable algorithm and parametrizing it with the right hyperparameters is crucial to tailor the AI approach to the given network management problem.</t>

<t>For example, there are many different regression techniques (classical linear, polynomial regression, lasso/ridge regression, SVR, regression trees, neural networks, etc.), each with different benefits and drawbacks and each with its own set of hyperparameters. Choosing a suitable technique depends on the amount and structure of the input data as well as on the desired output. It also depends on the available amount of compute resources and compute time until a prediction is required. If resources and time are not a limiting factor, many hyperparameters can be tuned automatically. In practice, however, the design space of choosing algorithms and hyperparameters is often so large that it cannot be effectively tuned automatically but also requires some initial expertise in selecting suitable AI algorithms and hyperparameters.</t>

<t>This sub-challenge holds for all fields of AI: Supervised learning (regression and classification), self-supervised learning, unsupervised learning, and reinforcement learning, each are broad and rapidly growing fields. Selecting suitable algorithms and hyperparameters to tailor AI approaches to the network management problem is both an opportunity and a challenge. Here, future work should further explore these trade-offs and provide clearer guidelines on how to navigate these trade-offs for different network management tasks.</t>

</section>
</section>
<section anchor="performance-of-produced-models"><name>Performance of produced models</name>

<t>From a general point of view, any AI technique will produce results with a certain level of quality. This leads to two inherent questions: (1) what is the definition of the performance in a context of a NM application? (2) How to measure it? and (3) How to ensure/improve the quality of produced results?</t>

<t>Many metrics have been already defined to evaluate the performance of an AI-based techniques in regards to its NM-level objectives. For example, QoS metrics (throughput, latency) can serve to measure the performance of a routing algorithm along with the computational complexity (memory consumption, size of routing tables). The question is to model and measure these two antagonist types of metrics. Number of true/false positives/negatives are the most basic metrics for network attack detection functions. Although the first two questions are thus already answered even if improvement can be done, question (3) refers to the integration of metrics into AI algorithms. Its objective is to obtain the best results which need to be quantified with these metrics. Depending on the type of algorithm, these metrics are either evaluated in an online manner with a feedback loop (for example with reinforcement learning) or in batch to optimize a model based on a particular context (for example described by a dataset for machine learning).</t>

<t>The problem is two-fold. First, the performance can be measured through multiple metrics of different types (numerical or ordinal for example) and some can be constrained by fixed boundaries (like a maximum latency), making their joint use challenging when creating an AI model to resolve a NM problem. Second, the scale metrics differ from each other in terms of importance or impact and can eventually vary on their domains. It can be hard to precisely assess what is a good or bad value (as it might depend on multiple other ones) and it is even more difficult to integrate in an AI technique, especially for learning algorithms to adjust their models based on the performance. Indeed, learning algorithms run through multiple iterations and rely on internal metrics (MAE or (R)MSE for neural network, gini index or entropy for decision trees, distance to an hyperplane for SVMs, etc) which are not strongly correlated to the final metrics of the application. For instance, a decision tree algorithm for classification purposes aims at being able to create branches with a maximum of data from the same classes and so avoid mixing classes. It is done thanks to a criterion like the entropy index but this kind of Index does not assume any difference between mixing class A and B or A and C. Assuming now that from an operational point of view, if A and B are mixed in the predictions is not critical, the algorithm should have preferred to mix and A and B rather than A and C even if in the first case it will produce more errors.</t>

<t>Therefore, the internal functioning of the AI algorithms should be refined, here by defining a particular criterion to replace the entropy as a quality measure when separating two branches. It assumes that the final NM objectives are integrated at this stage.</t>

<t>Another concrete example is traffic predictors which aim at forecasting traffic demands. They only produce an input that is not necessarily simple to be interpreted and used by, e.g., capacity allocation strategies/policies. A traditional traffic prediction that tries to minimize (perfectly symmetric) MAE/MSE treats positive and negative errors in identical ways, hence is agnostic of the diverse meaning (and costs) of under- and over-provisioning. And, such a prediction does not provide any information on, e.g., how to dimension resources/capacity to accommodate the future demand avoiding all underprovisioning (which entails service disruption) while minimizing overprovisioning (i.e., wasting resources). In other words, it forces the operator to guess the overprovisioning by taking (non-informed) safety margins. A more sensible approach here is instead forecasting directly the needed capacity, rather than the traffic <xref target="Beg19"/>.</t>

<t>While the one above is just an example, the high-level challenge is devising forecasting models that minimize the correct objective/loss function for the specific NM task at hand (instead of generic MAE/MSE). In this way, the prediction phase becomes an integral part of the NM, and not just a (limited and hard-to-use) input to it. In ML terms, this maps to solving the loss-metric mismatch in the context of anticipatory NM <xref target="Hua19"/>.</t>

<t>Another issue for statistical learning (from examples/observations) is mainly about extracting an estimator from a finite set of input-output samples drawn from an unknown probability distribution that should be descriptive enough for unseen/new input data. In this context online monitoring and error control of the quality/properties of these point estimators (bias, variance, mean squared error, etc.) is critical for dynamic/uncertain network environments. Similar reasoning/challenge applies for interval estimates, i.e., confidence intervals (frequentist) and credible intervals (Bayesian).</t>

</section>
<section anchor="lightweight-ai"><name>Lightweight AI</name>

<t>Network management and operations often need to be performed under strict time constraints, i.e. at line rate, in particular in the context of autonomic or self-driven networks. Locating NM functions as close as possible where forwarding is achieved is thus an interesting option to avoid additional delays when these operations are performed remotely, for example in a centralized controller. Besides, forwarding devices may offer available resources to supplement or replace edge resources. In case of AI coupled with network management, AI tasks can be offloaded in network devices, or more generally embedded within the network. Obviously, time-critical tasks are the best candidates to be offloaded within the network. Costly learning tasks should be processed in high-end servers but created models can be deployed, configured, modified and tuned in switches.</t>

<t>Recent advances in network programmability ease the programming of specific tasks at data-plane level. P4 <xref target="Bos14"/> is widely used today for many tasks including firewalling <xref target="Dat18"/> or bandwidth management <xref target="Che19"/>. P4 is prone to be agnostic to a specific hardware. Switches actually have particular architectures and the RMT (Reconfigurable Match Table) <xref target="Bos13"/> model is generally accepted to be generic enough to represent limited but essential switch architecture components and functionalities. P4 is inspired by this architecture. The RMT model allows reconfiguring match-action tables where actions can be usual ones (rewrite some headers, forward, drop...). Actions are thus applied on the packets when they are forwarded. Actions can also be more complex programs with some safeguards: no loop, resistivity… The impact on the program development is huge. For example, real number operations are not available by default while they are primordial in many AI algorithms.</t>

<t>In a nutshell, the first challenge to overcome of embedding AI in a network is the capacity of the hardware to support AI operations (architectural limitation). Considering software equipment such as a virtual switch simplifies the problem but does not totally resolve it as, even in that case, strong line-rate requirement limits the type of programs to be executed. For example, BPF (Berkeley Packet Filter) <xref target="Mcc93"/> programs provides a higher control on packet processing in OVS <xref target="Cha18"/> but still have some limitations, as the execution time of these programs are bounded by nature to ensure their termination, an essential requirement assuming the run-to-completion model which permits high throughput.</t>

<t>The second challenge (resource limitation) of network-embedded AI in the network is to allocate enough resources for AI tasks with a limited impact on other tasks of network devices such as forwarding, monitoring, filtering… Approximation and/or optimization of AI tasks are potential directions to help in this area. For instance, many network monitoring proposals rely on sketches and with a proposed  well-tuned implementation for data-plane <xref target="Liu16"/><xref target="Yan18"/>. However, no general optimized AI-programmable abstraction exists to fit all cases and proposals are mostly use-case centric.  Research direction in NM regarding this issue can benefit from propositions in the field of embedded systems that face the same issues. Binarization of neural networks is one example <xref target="Lia18"/>. Besides, distributed processing is a common technique to distribute the load of a single task between multiple entities. AI task decomposition between network elements, edge servers or controllers has been also proposed <xref target="Gup18"/>.</t>

</section>
<section anchor="DistributedAI"><name>Distributed AI</name>

<t>Distributed AI assumes different related tasks and components to be distributed across computational resources which are possibly heterogeneous. For example, with advances in transfer and Federated Learning (FL), models can be learned, partially shared and combined or data can be also shared to either improve a local or global model. By nature, a network and a networked infrastructure is distributed and is thus well adapted to any distributed applications. This is exacerbated with the deployment of fog infrastructure mixing network and computational resources. Hence, network management can directly benefit to the distributed network structure to solve its own particular problems but any other type of AI-based distributed applications also assumes communication technologies to enable interactions between the different entities. This leads to the two sub-challenges described hereafter.</t>

<section anchor="netManFordistributedAI"><name>Network management for efficient distributed AI</name>

<t>Distributed AI relies on exchanging information between different entities and comes with various requirements in terms of volume, frequency, security, etc. This can be  mapped to network requirements such as latency, bandwidth or confidentiality. Therefore, the network needs to provide adequate resources to support the proper execution of the AI distributed application. While this is true for any distributed application, the nature of the problem that is intended to be solved by an AI application and how this would be solved can be considered. For example, with FL, local models can be shared to create a global model. In case of failure of network links or in case of too high latency, some local models might not be appropriately integrated into the global model with a possible impact on AI performance. Depending on the nature of the latter, it might be better to guarantee high performance communications with a few number of nodes or to ensure connectivity between all of them even with lower network performance. Coupling is thus necessary between the network management plane and the distributed AI applications which leads to a set of questions to be addressed about interfaces, data and information models or protocols. While the network can be adapted or eventually adapt itself to the AI distributed applications, AI applications could also adapt themselves to the underlying network conditions. It paves the way to research on methods to support AI application aware-network management or network-aware AI applications or a mix of both.</t>

</section>
<section anchor="distributed-ai-for-network-management"><name>Distributed AI for network management</name>

<t>For network management applications relying on distributed AI, challenges from <xref target="netManFordistributedAI"></xref> are still valid. Furthermore, network management problems also consider network-specific elements like traffic to be analyzed or configuration to be set on distributed network equipments. Co-locating AI processing and these elements (fully or partially) may help to increase performance. For example, precalculation on traffic data can be offloaded on network routers before being further processed in high-end servers in a data-center. Besides, as data is forwarded through multiple routers, decomposition of AI processes along the forward path is possible <xref target="Jos22"/>. In general, distributed AI-based network management decisions could be made at different nodes in the network based on locally available information <xref target="Sch21"/>. Hence, deployment of AI-based solutions for network management can also take into account various network attributes like network topology, routing policies or network device capability. In that case, management of computational and network resources is even more coupled than in <xref target="netManFordistributedAI"></xref> since the network is both part of the AI pipeline resources and the managed object through AI.</t>

<t>A primary application for distributed AI is for management problems that have a local scope.  One example concerns problems that can be addressed at the edge, involving tasks and control loops that monitor and apply local optimizations to the edge in isolation from activities conducted by other instances across the network.   However, distributed AI can involve techniques in which multiple entities collaborate to solve a global problem. Such solutions lend themselves to problems in which centralized solutions are faced with certain foundational challenges such as security, privacy, and trust:   The need to maintain complete state in a centralized solution may not be practical in some cases due to concerns such as privacy and trust among multiple subdomains which may not want to share all of their data even if they would be willing to collaborate on a problem). Other foundational challenges concern issue related to timeliness, in which distributed solutions may have inherent advanges over centralized solutions as they avoid issues related to delays caused by the need to communicate updates globally and across long distances.</t>

</section>
</section>
<section anchor="ai-for-planning-of-actions"><name>AI for planning of actions</name>

<t>Many tasks in network management revolve around the planning of actions with the purpose of optimizing a network and facilitating the delivery of communication services.  For example, Paths need to be planned and set up in ways that minimize wasted network resources (to optimize cost) while facilitating high network utilization (avoiding bottlenecks and the formation of congestion hotspots) and ensuring resiliency (by making sure that backup paths are not congruent with primary paths).  Other examples were mentioned in <xref target="pbNM"></xref>.</t>

<t>The need for planning only increases with the rise of centralized control planes.  The promise of central control is that decisions can be optimized when made with complete knowledge of relevant context, as opposed to distributed control that needs to rely on local decisions being made with incomplete knowledge while incurring higher overhead to replicate relevant state across multiple systems.  However, as the scale of networks and interconnected systems continues to grow, so does the size of the planning task.  Many problems are NP-hard.  As a result, solutions typically need to rely on heuristics and algorithms that often result in suboptimal outcomes and that are challenging to deploy in a scalable manner.</t>

<t>The emergence of Intent-Based Networking emphasizes the need for automated planning even further.  The concept underlying “intent” is that it should allow users (network operators, not end users of communication services) to articulate desired outcomes without the need to specify how to achieve those outcomes. An Intent-Based System is responsible for translating the intent into courses of action that achieve the desired outcomes and that continue to maintain the outcomes over time. How the necessary courses of action are derived and what planning needs to take place is left open but where the real challenge lies.  Solutions that rely on clever algorithms devised by human developers face the same challenges as any other network management tasks.</t>

<t>These properties (problems with a clearly defined need, whose solution is faced with exploding search spaces and that today rely on algorithms and heuristics that in many cases result only suboptimal outcomes and significant limitations in scale) make automated planning of actions an ideal candidate for the application of AI-based solutions.</t>

<t>AI applications in network management in the past have been largely focusing on classification problems. Examples include analysis by Intrusion Protection Systems of traffic flow patterns to detect suspicious traffic, classification of encrypted traffic for improved QoS treatment based on suspected application type, and prediction of performance parameters based on observations.  In addition, AI has been used for troubleshooting and diagnostics, as well as for automated help and customer support systems.  However, AI-based solutions for the automated planning of actions, including the automated identification of courses of action, have to this point not been explored much.</t>

<t>A much-publicized leap in AI has been the development of AlphaGo <xref target="Sil16"/>.  Instead of using AI to merely solve classification problems, AlphaGo has been successful in automatically deriving winning strategy for board games, specifically the game of Go which features a prohibitively large search space that was long thought to put the ability to play Go at a world class level beyond the reach of problems that AI could solve.   Among the remarkable aspects of Alpha Go is that it is able to identify winning strategies completely on its own, without needing those strategies to be taught or learned by observations assuming the system is aware of rules.</t>

<t>The challenge for AI in network management is hence, where is the equivalent of an Alpha Go that can be applied to network management (and networking) problems?  Specifically, better solutions are needed for solutions that automatically derive plans and courses of actions for network optimization and similar NP-hard problems, such as provided today with only limited effectiveness by controllers and management applications.</t>

<t>Also, the evaluation of AI algorithms to derive courses of actions is more complex than more common regression or classification tasks. Actions need to be applied in order to observe the results it leads to. However, contrary to game playing, solutions need to be applied in the real world, where actions have real effects and consequences. Different orientations can be envisioned. First, incremental application of AI decisions with small steps can allow us to carefully observe and detect unexpected effects. This can be complemented with roll-back techniques. Second, formal verification techniques can be leveraged to verify decisions made by AI are maintained within safety bounds. Third, sandbox environments can be used but they <bcp14>SHOULD</bcp14> be representative enough of the real world. After progress in simulation and emulation, recent research advances lead to the definition of digital twins <xref target="I-D.irtf-nmrg-network-digital-twin-arch"/> which implies a tight coupling between a real system and its digital twin to ensure a parallel but synchronized execution. Alternatively, transfer learning techniques in another promising area to be able to capitalize on ML models applicable on a real word system in a more generic sandbox environment. It is actually also an open problem to make the use of AI more acceptable as highlighted in the dedicated section.</t>

</section>
</section>
<section anchor="netData"><name>Network data as input for ML algorithms</name>

<t>Many applications of AI takes as input data. The quality of the outputs of ML-based techniques are highly dependent on the quality and quantity of data used for learning but also on other parameters. For example, as modern network infrastructures move towards higher speed and scale, they aim to support increasingly more demanding services with strict performance guarantees. These often require resource reconfigurations at run time, in response to emerging network events, so that they can ensure reliable delivery at the expected performance level. Timely observation and detection of events is also of paramount importance for security purposes, and can allow faster execution of remedy actions thus leading to reduced service downtime.</t>

<t>Thus, the challenge of data management is multifaceted as detailed in next subsections.</t>

<section anchor="data-for-ai-based-nm-solutions"><name>Data for AI-based NM solutions</name>

<t>Assuming a network management application, the first problem to address is to define the data to be collected which will be appropriate to obtain accurate results. This data selection can require defining problem-specific data or features (feature engineering).</t>

<t>Firstly, NM has already produced a lot of methods and technologies to acquire data. However, in most cases, the goal was not to support AI problems and lead to a mismatch. Indeed, machine learning algorithms only work as desired when data to be analyzed respects properties. Many methods rely on vector-based distances which so supposes that the data encoded into the vector respects the underlying distance semantic. Taking the first n bytes of a packet as vectors and computing distances accordingly is possible but does not embed the semantic of the information carried out in the headers. For example, (deep) learning techniques mostly rely on vectors of (real) numbers as input which fits some metrics (packet/byte counts, latency, delays, etc) but needs some adjustment for categorical (IP addresses, port numbers, etc) or topological features. Conversions are usually applied using common techniques like one-hot encoding or by coarse-grained representations <xref target="Sco11"/>. However, more advanced techniques have been recently proposed to embed representation of network entities rather than pure encoding <xref target="Rin17"/><xref target="Evr19"/><xref target="Sol20"/>. Data to handle can be in a schema-free or eventually text-based format. One example could be the automated annotation of management intents provided in an unstructured textual format (policies descriptions, specifications,) to extract from them management entities and operations. For that purpose, suitable annotation models need to be built using existing NER (Named Entity Recognition) techniques usually applied for NLP. However, this <bcp14>SHALL</bcp14> be carefully crafted or specialized for network management (intent) language which indirectly bounces back to the challenges of AI techniques for NM specified earlier.</t>

<t>Secondly, The behavior of any network is not just derived from the events that can be directly observed, such as network traffic overload, but also from events occurring outside the environment of the network. The information provided by the detectors of such kinds of events, e.g. a natural incident (earthquake, storm), can be used to determine the adaptation of the network to avoid potential problems derived from such events. Those can be provided by BigData sources as well as sensors of many kinds. The AI challenge related to this task is to process large amounts of data and associate it with the effects that those events have on the network. It is hard to determine the static and dynamic relation between the data provided by external sources and the specific implications it has in networks. For instance, the effect of a “flash crowd” detected in an external source depends on the relation of a particular network to such an event. This can be addressed by AI and its particular application to network management. The objective is to complement a control-loop, as shown in <xref target="Mar18"/>, by including the specific AI engines into the decision components as well as the processes that close the loop, so the AI engine can receive feedback from the network in order to improve its own behavior. Similar challenges are addressed in other domains, image processing and computer vision, by using artifacts for anticipating movements in object location and identification.</t>

</section>
<section anchor="data-collection"><name>Data collection</name>

<t>Once defined, the second problem to address is the collection of data. Monitoring frameworks have been developed for many years such as IPFIX <xref target="RFC7011"/> and more recently with SDN-based monitoring solutions <xref target="Yu14"/><xref target="Ngu20"/>. However, going towards more AI for actions in network management supposes also to retrieve more than traffic related information. Actually, configuration information such as topologies, routing tables or security policies have been proven to be relevant in specific scenarios. As a result, many different technologies can be used to retrieve meaningful data. To support improved QoE, monitoring of the application layer is helpful but far from being easy with the heterogeneity of end-user applications and the wide use of encrypted channels. Monitoring techniques need to be reinvented through the definition of new techniques to extract knowledge from raw measurement <xref target="Bri19"/> or by involving end-users with crowd-sourcing <xref target="Hir15"/> and distributed monitoring. Also, the data-mesh concept proposes to classify data into three categories: source-aligned, aggregate and consumer-aligned. Source-aligned data are those related to the same operational domain and it is important to correlate or aggregate them with higher planes: management-, control- and forwarding plane. An issue is the difference, not only in the nature of data, but in their volumes and their variety. Some may change rapidly over time (for example network traffic) while other may be quite stable (device state).</t>

<t>The collecting process requirements depend on the kind of processing. We can distinguish two major classes: batch/offline vs real-time/online processing. In particular, real-time monitoring tools are key in enabling dynamic resource management functions to operate on short reconfiguration cycles. However, maintaining an accurate view of the network state requires a vast amount of information to be collected and processed. While efficient mechanisms that extract raw measurement data at line rate have been recently developed, the processing of collected data is still a costly operation. This involves potentially sampling, evaluating and aggregating a vast amount of state information as a response to a diverse set of monitoring queries, before generating accurate reports. One difficult problem resides also in the availability of data as real-time data from different sources to be aggregated may not arrive at the same time requiring so some buffering techniques. Machine learning methods, e.g. based on regression, can be used to intelligently filter the raw measurements and thus reduce the volume of data to process. For example, in <xref target="Tan20"/> the authors proposed an approach in which the classifiers derived for this purpose (according to measurements on traffic properties) can achieve a threefold improvement in the query processing capability. A residual question is the storage of raw measurements. In fact, predicting the lifetime of data is challenging because their analysis may not be planned and triggered by a particular event (for example, an anomaly or attack). As a result, the provisioning of storage capacity can be hard.</t>

<t>In parallel to the continuously increasing dynamicity of networks and complexity of traffic, there is a trend towards more user traffic processing customization <xref target="RFC8986"/><xref target="Li19"/>. As a result, fine grained information about network element states is expected and new propositions have emerged to collect on-path data or in-band network telemetry information <xref target="Tan20b"/>. These new approaches have been designed by introducing much flexibility and customization and could be helpful to be used in conjunction with AI applications. However, the seamless coupling of telemetry processes with packet forwarding requires careful definition of solutions to limit the overhead and the impact of the throughput while providing the necessary level of details. This shares commonalities with the lightweight AI challenge.</t>

</section>
<section anchor="usable-data"><name>Usable data</name>

<t>Although all agree on the necessity to have more shared datasets, it is quite uncommon in practice. Data contains private or sensitive information and may not be shared because of the criticality of data (which can be used by ill-intentioned adversaries) or due to laws or regulations, even within the same company. To solve this issue, anonymization techniques <xref target="Dij19"/> can be enhanced to optimize the trade-off between valuable data vs sensitive information (potential) leakage or reconstruction.
Whatever the final user of data, regulations and laws impose rules on data management with potentially costly impact if they are not respected voluntarily or not. Defining a new monitoring framework should always consider security and privacy aspects, for example to let any user/customer or access/remove its own data with General Data Protection Regulation (GDPR) in EU. The challenge resides here in the capacity of qualifying what is critical or private information and the capacity for an adversary to reconstruct it from other sources of data. Hence AI/ML based solutions will require more data but also more administrative, legal and ethical procedures. Those can last long and so slow down the deployment of a new solution. In addition, this requires interaction with experts from different domains (e.g. AI engineer and a lawyer). The integration of these non-technical constraints should be considered when defining new data to be collected or a new technique to collect data. However, knowing the final use of data is most of the time necessary for ethical and legal assessment which assumes that those considerations <bcp14>SHOULD</bcp14>  be integrated from the early design of new AI-based solutions.</t>

<t>For supervised or semi-supervised training, having a labeled dataset is a prerequisite. It constitutes a major challenge as well. One one hand, collectors are able to retrieve data. On the other hand, those network data are typically unlabeled. This limits application of ML to unsupervised learning tasks (learning from data). Because manual labeling is a tedious task. one option is to leverage AI to guide humans. This may also support a better generalization of a learned model. Indeed, an underlying challenge is the genericity or coverage of the datasets. Labels encode values of an objective function, the challenge posed by the design of such tools is tremendous since for involving a M:N relationship: 1 data type may be associated to M objective function values and N data types may be associated to 1 objective function. As a result, most datasets used for research encodes a single label for a particular application like attack label for datasets to be used in the context of intrusion detection or application type for network traffic used for classification where the value of a single dataset could be capitalized in several applications.</t>

<t>Again, researchers need empirical (or at least realistic) datasets to validate their solutions. Unfortunately, as highlighted above, having such data from real deployments for various reasons (business secrets, privacy concerns, concerns that vulnerabilities are revealed by accident, raw unlabeled data, etc.) is tough. Even if such a dataset is available it might not be enough to convincingly validate a new algorithm.
Instead of falling back to artificial testbed experiments or simulation, it would be useful to have the capability to generate datasets with characteristics that are not 100% identical but similar to the characteristics of one or more real datasets. Such synthetic networks can be used to validate new management algorithms, intrusion detection systems, etc.
The usage of AI (for example GANs) in this area <xref target="Hui22"/> is not yet widespread and there are still many concerns that deter researchers, e.g. the fear of leaking sensitive information from the original dataset into the synthetic dataset.</t>

</section>
</section>
<section anchor="acceptability"><name>Acceptability of AI</name>

<t>Networks are critical infrastructures. On one hand, they <bcp14>SHOULD</bcp14> be operated without interruption and must be interoperable. Networks, except in a lab, are not isolated which slow down innovation in general. For example, changing Internet routing protocols <bcp14>SHOULD</bcp14> be accepted by all. The same applies for protocol. Even if there have been several versions of major protocols in use like TCP or DNS, there are still some security issues which cannot be patched with 100% guarantee. On the other hand, results provided by AI solutions are uncertain by nature. The same technique applied in different environments can produce different results. AI techniques need some effort (time and human) to be properly configured or to be stabilized. For instance, reinforcement learning needs several iterations before being able to produce acceptable results. These properties of AI techniques are thus a bit antagonist with the criticality of network infrastructures. With that in mind, acceptability of AI by network operators is clearly an obstacle for its larger adoption.</t>

<section anchor="explainability"><name>Explainability of Network-AI products</name>

<t>A common issue across all Machine Learning (ML) applications is that they are black boxes. This means that, after training, the knowledge acquired by ML models is unintelligible to humans. As a result, offering hard guarantees on performance is a very challenging issue. In addition, complex ML models like neural networks -that often have more than hundreds of thousands of parameters- are very hard to debug or troubleshoot in case of failure.</t>

<t>While this is a common issue for all applications of AI, many areas work well with uncertainty and the black-box behavior of AI-based solutions. For instance, users accept an inherent error in recommender systems or computer vision solutions.</t>

<t>The networking field has already produced a set of well-established network management algorithms and methods, with clear performance guarantees and troubleshooting mechanisms <xref target="Rex06"/><xref target="Kr14"/>. As such, improving debugging, troubleshooting and guarantees on AI-based solutions for networking is a must.</t>

<t>AI researchers and practitioners are devoting large research efforts to improve this aspect of ML models, which is commonly known as explainability <xref target="XAI"/>.</t>

<t>This set of techniques provides insights and, in some cases, guarantees on the performance and behavior of ML-based solutions. Understanding such techniques, researching and applying them to network AI is critical for the success of the field.</t>

<t>There exist several ML-based methods that are human-understandable, although not widely used today. For instance, <xref target="Mar20"/> shows a method for building anticipation models (prediction) that provide explanations while determining some actions for tuning some parameters of the network. There are other challenges that <bcp14>SHOULD</bcp14> be addressed, such as providing explanations for other ML methods that are quite extended. For instance, xNN/SVM models can be accompanied by Digital Twins of the network that are reversely explored to explain some output from the ML model (e.g., xNN/SVM). In this context, there already exist several methods <xref target="Zil20"/><xref target="Puj21"/> that produce human-readable interpretations of trained NN models, by analyzing their neural activations on different inputs. (As an aside, it should be noted that Digital Twins are not considered per se an AI approach; they merely serve to provide a digital representation of a network that can serve as its proxy and offer a layer of indirection between management applications and actual network resources. That being said, it is conceivable that AI-based management applications can be combined and operate in conjunction with Digital Twin technology, for example to use a Digital Twins as an experimentation sandbox or staging ground for AI-driven applciations.)</t>

</section>
<section anchor="ai-based-products-and-algorithms-in-production-systems"><name>AI-based products and algorithms in production systems</name>

<t>AI-based network management and optimization algorithms are first trained, then the resulting model is used to produce relevant inferences in operation, either in management or optimization scenarios. A relevant question for the success of AI-based solutions is: where does this training occur?</t>

<t>Traditionally, AI-based models have been trained in the same scenario where they operate<xref target="Val17"/><xref target="Xu18"/>, this is the customer network. However this presents critical drawbacks. First, training an AI model for management and operation typically requires generating network configurations and scenarios that can break the network. This is because training requires seeing a broad spectrum of scenarios. Thus, it is not feasible in production networks. Second, customer networks may not be equipped with the monitoring infrastructure required to collect the data used in the training process (e.g., performance metrics).</t>

<t>A more sensible approach is to train the AI-based product in a lab, for instance in the vendor’s premises. In the lab, AI models can be trained in a controlled testbed, with any configuration, even ones that break the network. However, the main challenge here arises from the fundamental differences between the lab’s network and the customer networks. For instance, the topology of the lab’s network might be smaller, etc. As a result, there is a need for models that are able to generalize. In this context, generalization means that models should be able to operate in other scenarios not seen during training, with different topologies, routing configurations, scheduling policies, etc.</t>

<t>In order to address this generalization problem, multiple complementary approaches are possible: 
One approach is training on diverse data that represents large parts of the expected problem space. For example, training with various different traffic patterns will help improve generalization to unseen but comparable traffic patterns.
Another approach is to leverage AI designs or architectures that facilitate generalization. One example are Graph Neural Networks (GNN) <xref target="gnn1"/><xref target="gnn2"/>. GNNs are a rather novel type of neural network able to operate and generalize over graphs. Indeed, networks are fundamentally represented as graphs: topology, routing, etc. With GNNs, vendors can train the AI model in a lab with a certain topology and then directly use the resulting model in different customer networks, even with different network topologies.
Finally, another approach is Transfer Learning <xref target="tl1"/>. With this technique, the knowledge gained in the lab’s training  is used to operate in the customer network. Transfer Learning still requires that some data from the customer is used to re-train and fine-tune the model (e.g., accurate performance measurements). This means that, for each customer network, re-training is required. This may be problematic since it requires added cost and access to customer data.</t>

<t>In addition to the challenge of generalizing from training to production environment, there are also challenges in terms of interoperability between different AI approaches and different deployment environments.
As mentioned above, AI approaches may be deployed in diverse environments, e.g., for training and production, but also for local development, for testing, and for validation or in different part of the production systems.
These environments may differ in available compute resources, network topology, operating systems, cloud providers, etc. (single node machine, single cluster, many distributed clusters, ...). Deploying the same AI solutions in these different environments can lead to various challenges in terms of interoperability. Common AI frameworks support scaling across networks of different size. Yet, many frameworks are often combined, e.g., for data collection, processing, predictions, validation, etc. Again, ensuring interoperability between these frameworks can be tedious.</t>

<t>This shares some  with problems described in <xref target="DistributedAI"></xref> and particularly emphasizes the need for network environments to provide interfaces and descriptions suitable for AI solutions to be properly instantiated and configured.</t>

<t>One approach to address these interoperability challenges is through meta-frameworks that interface with most available AI frameworks. These meta-frameworks provide a higher level of abstraction and often allow seamless deployment across different environments (e.g., on-premise or at different cloud providers) <xref target="Mor18"/>.</t>

</section>
<section anchor="ai-with-humans-in-the-loop"><name>AI with humans in the loop</name>

<t>Depending on the network management task, AI can automate and replace manual human control or it can complement human experts and keep them in the loop. Keeping humans in the loop will be an important step of building trust in AI approaches and help ensure the desired outcomes.
There are various ways of keeping humans in the loop in the different fields of AI, which could be useful for different aspects of network management.</t>

<t>In classification tasks (e.g., detecting security breaches, malware or detecting anomalies), trained AI models provide a confidence score in addition to the predicted class. If the confidence is high, the prediction is used directly. If the confidence is too low, a human expert may jump in and make the decision - thereby also providing valuable training data to improve the AI model. Such approaches are already being used in industry, e.g., to automatically label datasets (AWS SageMake). Similar approaches could also be used for other supervised learning tasks, e.g., regression. Still, it is an open challenge to keep humans in the loop in all phases of the learning process.</t>

<t>Another field of AI is reinforcement learning, which is useful for taking continuous control decisions in network management, e.g., controlling service scaling and placement as well as flow scheduling and routing over time. Reinforcement learning agents typically interact with the environment (i.e., the simulated or real network) completely autonomously without human feedback. However, there is a growing number of approaches to put human experts back into the loop. One approach is offline reinforcement learning, where the training data does not come from the reinforcement learning agent’s own exploration but from pre-recorded traces of human experts (e.g., placement decisions that were made by humans before). Another approach is to reward the reinforcement learning agent based on human feedback rather than a pre-defined reward function <xref target="Lee21"/>. Again, while there are first promising approaches, more work is required in this area.
Overall, it is an open challenge to both leverage the benefits of AI but keep human experts in the loop where it is useful.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security considerations</name>

<t>This document introduces the challenges of coupling AI and NM. Since the aim of this document is not to address a particular NM problem by defining a solution and because many possible ones can be developed further to address the proposed challenge, it is not possible at this stage to define security concerns specific to a solution. However, examples of applications mentioned and cited in the different sections may face their own security concerns. In this section, our objective is to highlight high-level security considerations to be considered when coupling AI and NM. Those concerns serves as the common basis to be refined according when a particular NM application is developped.</t>

<section anchor="ai-based-security-solutions"><name>AI-based security solutions</name>

<t>The first security consideration refers to the use of AI for NM problem related to security of the managed networked systems. There are multiple scenarios where AI can be leveraged: to perform traffic filtering, to detect anomalies or to decide on target moving defence strategies. In these cases, the performance of the AI algorithms impacts on the security performance (e.g. detection or mitigation effectiveness) like any other non-AI system. However, AI methods generally tends to obfuscate how predictions are made and decisions taken. Explainability of AI is thus highly important. This is why this concern is addressed globally in this document in section <xref target="explainability"></xref> as it is a general problem that can impact on any other type of NM applications.</t>

<t>Assuming a ML trained model, there is always an uncertainty regarding reachable performance on the wild once the solution is deployed as it can suffer from a poor generalization due to different reasons. There are two major problems which are well known in the ML field: overfitting or under-fitting.  In the first case, the learned model is too specific to the training data while in the second case the model does not infer any valuable knowledge from data. To avoid these issues, hyper-parameter fine-tuning is necessary. For example, the number of iterations is an essential hyper-parameter to be adjusted to learn a neural network model. If it is too low, the learning does not converge to a representative model of the training data (underfitting). With a high value, there is a risk that the model is too close to the training data (overfitting). In general, finding the right hyper-parameters is helpful to find a good ML algorithm configurations. There are different techniques ranging from grid-search to bayesian optimization falling into the AI area of Hyper-Parameter Optimization (HPO) <xref target="Bis23"/>. This consideration goes beyond the sole problem of hyper-parameters settings but as a full analysis pipeline also assumes the ML algorithm to be selected or the data pre-processing to be configured. This reflects challenges from the AI research area covered by AutoMl technique. In this document, this is also referred in section <xref target="tailoringAI"></xref> when considered in the context of NM. As highlighted in the aforementioned section, some expertise or area-specific knowledge can help guiding automated configuration processes.</t>

<t>Besides, machine learning assumes to have representative training data. The quality of dataset for learning is a vast problem. Additionally, the representation of data needs to be addressed carefully to be properly analyzed by AI models, for example with pre-processing techniques to normalize data, balance classes or encode categorical features depending on the type of algorithms. Actually, <xref target="netData"></xref> of this document fully addresses the concerns related to data in regards to NM problems.</t>

</section>
<section anchor="security-of-ai"><name>Security of AI</name>

<t>Although ensuring a good performance of AI algorithms is already challenging, assuming an attacker aiming at compromising it emphasizes the problem. Adversarial AI and notably adversarial ML have attracted a lot of attention over the last year. Adversarial AI and ML relates to both attack and defences. While this is out of scope of the document, evaluating threats against an ML system before deploying it is an important aspect. This supposes to assess what types of information the attacker can access (training data, trained model, algorithm configuration...) and the performable malicious actions (inject false training data, test the system, poison a model,  etc.) to evaluate the magnitude of the impact of possible attacks.</t>

<t>For illustration purposes, we refer hereafter to some examples. In the case of an intrusion detector, an attacker may try to compromise training data by providing adversarial samples to ensure that the detector will miss-classify the future attacks <xref target="Jmi22"/>. In a white-box approach where the model is known from the attacker, the attack can be carefully crafted to avoid being properly labeled. For instance, packet sizes and timings can be easily modified to bypass ML-based traffic classification system <xref target="Nas21"/>. In a black-box model, the attacker ignores the functioning or training data of the ML systems but can try to infer some information. For example, the attacker can try to reconstruct sensitive information which have been used for training. This type of attack qualified as model inversion <xref target="Fre15"/> raises concern regarding privacy.</t>

<t>All these threats are exacerbated in the context of solutions relying on distributed AI involving multiple entities that are not necessarily controlled by the same authority. Once the threats are assessed, solutions needs to be developed and deployed which can be either proactive by providing some guarantees regarding the involved entities using authentication or trust mechanisms but also reactive by validating data processing through voting mechanisms or knowledge proofs. Other solutions include defensive techniques to rate limit or filter queries to a particular deployed model. All these examples are for illustration purposes and are not exhaustive.</t>

</section>
<section anchor="relevance-of-ai-based-outputs"><name> Relevance of AI-based outputs</name>

<t>Security breaches can be created by an AI-driven application. Actually,any system that will be use to guide or advice on actions to be perform on network raise the same issue. For example, if an AI algorithm decide to change the filtering tables in a network it may compromise access control policies. Irrelevant results could be also produced. In the area of QoS, an AI system could allocate a bandwidth to a flow higher to the real link capacity. As shown from these two examples, an AI can produce decisions or values which are out of bounds of normal operations. To avoid such issues, safeguards can be added to discard or correct irrelevant outputs. Detecting such type of outputs can be also challenging in complex and distributed systems such as a network. Formal verification methods or testing techniques are helpful in that context.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>

&RFC7011;
&RFC8986;
&RFC9315;
&RFC2119;
&RFC8174;


    </references>

    <references title='Informative References'>

&I-D.irtf-nmrg-network-digital-twin-arch;
<reference anchor="Mcc93" >
  <front>
    <title>The BSD packet filter: a new architecture for user-level packet capture</title>
    <author initials="S." surname="McCanne" fullname="Steve McCanne">
      <organization></organization>
    </author>
    <author initials="V." surname="Jacobson" fullname="Van Jacobson">
      <organization></organization>
    </author>
    <date year="1993"/>
  </front>
<annotation>USENIX Winter Conference</annotation></reference>
<reference anchor="Ste92" >
  <front>
    <title>A Diagnosis Expert System for Network Traffic Management</title>
    <author initials="D." surname="Stern" fullname="Daniel Stern">
      <organization></organization>
    </author>
    <author initials="P." surname="Chemouil" fullname="Prosper Chemouil">
      <organization></organization>
    </author>
    <date year="1992"/>
  </front>
<annotation>Networks, Kobe, Japan</annotation></reference>
<reference anchor="Abd10" >
  <front>
    <title>A Diagnosis Expert System for Network Traffic Management</title>
    <author initials="K. A." surname="Jalil" fullname="Kamarularifin Abd Jalil">
      <organization></organization>
    </author>
    <author initials="M. H." surname="Kamarudin" fullname="Muhammad Hilmi Kamarudin">
      <organization></organization>
    </author>
    <author initials="M. N." surname="Masrek" fullname="Mohamad Noorman Masrek">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
<annotation>IEEE international conference on networking and information technology</annotation></reference>
<reference anchor="Beg19" >
  <front>
    <title>DeepCog: Cognitive Network Management in Sliced 5G Networks with Deep Learning</title>
    <author initials="D." surname="Bega" fullname="D. Bega">
      <organization></organization>
    </author>
    <author initials="M." surname="Gramaglia" fullname="M. Gramaglia">
      <organization></organization>
    </author>
    <author initials="M." surname="Fiore" fullname="M. Fiore">
      <organization></organization>
    </author>
    <author initials="A." surname="Banchs" fullname="A. Banchs">
      <organization></organization>
    </author>
    <author initials="X." surname="Costa-Perez" fullname="X. Costa-Perez">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IEEE INFOCOM</annotation></reference>
<reference anchor="Bos13" >
  <front>
    <title>Forwarding metamorphosis: Fast programmable match-action processing in hardware for SDN</title>
    <author initials="P." surname="Bosshart" fullname="Pat Bosshart">
      <organization></organization>
    </author>
    <author initials="G." surname="Gibb" fullname="Glen Gibb">
      <organization></organization>
    </author>
    <author initials="H.-S." surname="Kim" fullname="Hun-Seok Kim">
      <organization></organization>
    </author>
    <author initials="G." surname="Varghese" fullname="George Varghese">
      <organization></organization>
    </author>
    <author initials="N." surname="McKeown" fullname="Nick McKeown">
      <organization></organization>
    </author>
    <author initials="M." surname="Izzard" fullname="Martin Izzard">
      <organization></organization>
    </author>
    <author initials="F." surname="Mujica" fullname="Fernando Mujica">
      <organization></organization>
    </author>
    <author initials="M." surname="Horowitz" fullname="Mark Horowitz">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
<annotation>ACM SIGCOMM</annotation></reference>
<reference anchor="Bos14" >
  <front>
    <title>P4: programming protocol-independent packet processors</title>
    <author initials="P." surname="Bosshart" fullname="Pat Bosshart">
      <organization></organization>
    </author>
    <author initials="D." surname="Daly" fullname="Dan Daly">
      <organization></organization>
    </author>
    <author initials="G." surname="Gibb" fullname="Glen Gibb">
      <organization></organization>
    </author>
    <author initials="M." surname="Izzard-" fullname="Martin Izzard-">
      <organization></organization>
    </author>
    <author initials="N." surname="McKeown" fullname="Nick McKeown">
      <organization></organization>
    </author>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization></organization>
    </author>
    <author initials="C." surname="Schlesinger" fullname="Cole Schlesinger">
      <organization></organization>
    </author>
    <author initials="D." surname="Talayco" fullname="Dan Talayco">
      <organization></organization>
    </author>
    <author initials="A." surname="Vahdat" fullname="Amin Vahdat">
      <organization></organization>
    </author>
    <author initials="G." surname="Varghese" fullname="George Varghese">
      <organization></organization>
    </author>
    <author initials="D." surname="Walker" fullname="David Walker">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
<annotation>SIGCOMM Comput. Commun. Rev. 44</annotation></reference>
<reference anchor="Dat18" >
  <front>
    <title>P4Guard: Designing P4 Based Firewall</title>
    <author initials="R." surname="Datta" fullname="R. Datta">
      <organization></organization>
    </author>
    <author initials="S." surname="Choi" fullname="S. Choi">
      <organization></organization>
    </author>
    <author initials="A." surname="Chowdhary" fullname="A. Chowdhary">
      <organization></organization>
    </author>
    <author initials="Y." surname="Park," fullname="Y. Park,">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Military Communications Conference (MILCOM)</annotation></reference>
<reference anchor="Che19" >
  <front>
    <title>P4-Enabled Bandwidth Management</title>
    <author initials="Y." surname="Chen" fullname="Y. Chen">
      <organization></organization>
    </author>
    <author initials="L." surname="Yen" fullname="L. Yen">
      <organization></organization>
    </author>
    <author initials="W." surname="Wang" fullname="W. Wang">
      <organization></organization>
    </author>
    <author initials="C." surname="Chuang" fullname="C. Chuang">
      <organization></organization>
    </author>
    <author initials="Y." surname="Liu" fullname="Y. Liu">
      <organization></organization>
    </author>
    <author initials="C." surname="Tseng" fullname="C. Tseng">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>Asia-Pacific Network Operations and Management Symposium (APNOMS)</annotation></reference>
<reference anchor="Cha18" >
  <front>
    <title>Oko: Extending Open vSwitch with Stateful Filters</title>
    <author initials="P." surname="Chaignon" fullname="Paul Chaignon">
      <organization></organization>
    </author>
    <author initials="K." surname="Lazri" fullname="Kahina Lazri">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="T." surname="Delmas" fullname="Thibault Delmas">
      <organization></organization>
    </author>
    <author initials="O." surname="Festor" fullname="Olivier Festor">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>ACM Symposium on SDN Research (SOSR)</annotation></reference>
<reference anchor="czb20" >
  <front>
    <title>Network Management 2030: Operations and Control of Network 2030 Services</title>
    <author initials="A." surname="Clemm" fullname="A. Clemm">
      <organization></organization>
    </author>
    <author initials="M. F." surname="Zhani" fullname="M. F. Zhani">
      <organization></organization>
    </author>
    <author initials="R." surname="Boutaba" fullname="R. Boutaba">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Springer Journal of Network and Systems Management (JNSM)</annotation></reference>
<reference anchor="Hua19" >
  <front>
    <title>Addressing the Loss-Metric Mismatch with Adaptive Loss Alignment</title>
    <author initials="C." surname="Huang" fullname="Chen Huang">
      <organization></organization>
    </author>
    <author initials="S." surname="Zhai" fullname="Shuangfei Zhai">
      <organization></organization>
    </author>
    <author initials="W." surname="Talbott" fullname="Walter Talbott">
      <organization></organization>
    </author>
    <author initials="M. A." surname="Bautista" fullname="Miguel Angel Bautista">
      <organization></organization>
    </author>
    <author initials="S.-Y." surname="Sun" fullname="Shih-Yu Sun">
      <organization></organization>
    </author>
    <author initials="C." surname="Guestrin" fullname="Carlos Guestrin">
      <organization></organization>
    </author>
    <author initials="J." surname="Susskind" fullname="Josh Susskind">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>ICRL</annotation></reference>
<reference anchor="Jos22" >
  <front>
    <title>NetREC Network-wide in-network REal-value Computation.</title>
    <author initials="M." surname="Jose" fullname="Matthews Jose">
      <organization></organization>
    </author>
    <author initials="K." surname="Lazri" fullname="Kahina Lazri">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="O." surname="Festor" fullname="Olivier Festor">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>IEEE International Conference on Network Softwarization (NetSoft)</annotation></reference>
<reference anchor="Lee21" >
  <front>
    <title>Feedback-efficient interactive reinforcement learning via relabeling experience and unsupervised pre-training</title>
    <author initials="K." surname="Lee" fullname="K. Lee">
      <organization></organization>
    </author>
    <author initials="L." surname="Smith" fullname="L. Smith">
      <organization></organization>
    </author>
    <author initials="P." surname="Abbeel" fullname="P. Abbeel">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>arXiv preprint arXiv:2106.05091</annotation></reference>
<reference anchor="Lia18" >
  <front>
    <title>FP-BNN: Binarized neural network on FPGA</title>
    <author initials="S." surname="Liang" fullname="Shuang Liang">
      <organization></organization>
    </author>
    <author initials="S." surname="Yin" fullname="Shouyi Yin">
      <organization></organization>
    </author>
    <author initials="L." surname="Liu" fullname="Leibo Liu">
      <organization></organization>
    </author>
    <author initials="W." surname="Luk" fullname="Wayne Luk">
      <organization></organization>
    </author>
    <author initials="S." surname="Wei" fullname="Shaojun Wei">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>Neurocomputing, Volume 275</annotation></reference>
<reference anchor="Liu16" >
  <front>
    <title>One Sketch to Rule Them All: Rethinking Network Flow Monitoring with UnivMon</title>
    <author initials="Z." surname="Liu" fullname="Zaoxing Liu">
      <organization></organization>
    </author>
    <author initials="A." surname="Manousis" fullname="Antonis Manousis">
      <organization></organization>
    </author>
    <author initials="G." surname="Vorsanger" fullname="Gregory Vorsanger">
      <organization></organization>
    </author>
    <author initials="V." surname="Sekar" fullname="Vyas Sekar">
      <organization></organization>
    </author>
    <author initials="V." surname="Braverman" fullname="Vladimir Braverman">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
<annotation>ACM SIGCOMM Conference</annotation></reference>
<reference anchor="Yan18" >
  <front>
    <title>Elastic sketch: adaptive and fast network-wide measurements</title>
    <author initials="T." surname="Yang" fullname="Tong Yang">
      <organization></organization>
    </author>
    <author initials="J." surname="Jiang" fullname="Jie Jiang">
      <organization></organization>
    </author>
    <author initials="P." surname="Liu" fullname="Peng Liu">
      <organization></organization>
    </author>
    <author initials="Q." surname="Huang" fullname="Qun Huang">
      <organization></organization>
    </author>
    <author initials="J." surname="Gong" fullname="Junzhi Gong">
      <organization></organization>
    </author>
    <author initials="Y." surname="Zhou" fullname="Yang Zhou">
      <organization></organization>
    </author>
    <author initials="R." surname="Miao" fullname="Rui Miao">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xiaoming Li">
      <organization></organization>
    </author>
    <author initials="S." surname="Uhlig" fullname="Steve Uhlig">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>ACM SIGCOMM Conference</annotation></reference>
<reference anchor="Gup18" >
  <front>
    <title>Sonata: query-driven streaming network telemetry</title>
    <author initials="A." surname="Gupta" fullname="Arpit Gupta">
      <organization></organization>
    </author>
    <author initials="R." surname="Harrison" fullname="Rob Harrison">
      <organization></organization>
    </author>
    <author initials="M." surname="Canini" fullname="Marco Canini">
      <organization></organization>
    </author>
    <author initials="N." surname="Feamster" fullname="Nick Feamster">
      <organization></organization>
    </author>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization></organization>
    </author>
    <author initials="W." surname="Willinger" fullname="Walter Willinger">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>ACM SIGCOMM Conference</annotation></reference>
<reference anchor="Mar18" >
  <front>
    <title>Exploiting External Events for Resource Adaptation in Virtual Computer and Network Systems</title>
    <author initials="P." surname="Martinez-Julia" fullname="Pedro Martinez-Julia">
      <organization></organization>
    </author>
    <author initials="V. P." surname="Kafle" fullname="Ved P. Kafle">
      <organization></organization>
    </author>
    <author initials="H." surname="Harai" fullname="Hiroaki Harai">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Transactions on Network and Service Management, Vol. 15, N. 2,</annotation></reference>
<reference anchor="Mar20" >
  <front>
    <title>Explained Intelligent Management Decisions in Virtual Networks and Network Slices</title>
    <author initials="P." surname="Martinez-Julia" fullname="Pedro Martinez-Julia">
      <organization></organization>
    </author>
    <author initials="V. P." surname="Kafle" fullname="Ved P. Kafle">
      <organization></organization>
    </author>
    <author initials="H." surname="Asaeda" fullname="H. Asaeda">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)</annotation></reference>
<reference anchor="Mus18" >
  <front>
    <title>An overview on application of machine learning techniques in optical networks</title>
    <author initials="F." surname="Musumeci" fullname="F. Musumeci">
      <organization></organization>
    </author>
    <author initials="C." surname="Rottondi" fullname="C. Rottondi">
      <organization></organization>
    </author>
    <author initials="A." surname="Nag" fullname="A. Nag">
      <organization></organization>
    </author>
    <author initials="I." surname="Macaluso" fullname="I. Macaluso">
      <organization></organization>
    </author>
    <author initials="D." surname="Zibar" fullname="D. Zibar">
      <organization></organization>
    </author>
    <author initials="M." surname="Ruffini" fullname="M. Ruffini">
      <organization></organization>
    </author>
    <author initials="M." surname="Tornatore" fullname="M. Tornatore">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Communications Surveys &amp; Tutorials, 21(2), 1383-1408.</annotation></reference>
<reference anchor="Ngu20" >
  <front>
    <title>Efficient SDN-based traffic monitoring in IoT networks with double deep Q-network</title>
    <author initials="T. G." surname="Nguyen" fullname="T. G. Nguyen">
      <organization></organization>
    </author>
    <author initials="T. V." surname="Phan" fullname="T. V. Phan">
      <organization></organization>
    </author>
    <author initials="D. T." surname="Hoang" fullname="D. T. Hoang">
      <organization></organization>
    </author>
    <author initials="T. N." surname="Nguyen" fullname="T. N. Nguyen">
      <organization></organization>
    </author>
    <author initials="C." surname="So-In" fullname="C. So-In">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>International conference on computational data and social networks, Springer</annotation></reference>
<reference anchor="Tan20" >
  <front>
    <title>Classification-assisted Query Processing for Network Telemetry</title>
    <author initials="G." surname="Tangari" fullname="G. Tangari">
      <organization></organization>
    </author>
    <author initials="M." surname="Charalambides" fullname="M. Charalambides">
      <organization></organization>
    </author>
    <author initials="G." surname="Pavlou" fullname="G. Pavlou">
      <organization></organization>
    </author>
    <author initials="C." surname="Grazian" fullname="C. Grazian">
      <organization></organization>
    </author>
    <author initials="D." surname="Tuncer" fullname="D. Tuncer">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Network Traffic Measurement and Analysis Conference (TMA)</annotation></reference>
<reference anchor="Tan20b" >
  <front>
    <title>In-band Network Telemetry: A Survey</title>
    <author initials="T." surname="Lizhuang" fullname="Tan, Lizhuang">
      <organization></organization>
    </author>
    <author initials="S." surname="Wei" fullname="Su, Wei">
      <organization></organization>
    </author>
    <author initials="Z." surname="Zhenyi" fullname="Zhang, Zhenyi">
      <organization></organization>
    </author>
    <author initials="M." surname="Jingying" fullname="Miao, Jingying">
      <organization></organization>
    </author>
    <author initials="L." surname="Xiaoxi" fullname="Liu, Xiaoxi">
      <organization></organization>
    </author>
    <author initials="L." surname="Na" fullname="Li, Na">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Computer Networks. 186. 10.1016</annotation></reference>
<reference anchor="Val17" >
  <front>
    <title>Learning to route</title>
    <author initials="V." surname="A." fullname="Valadarsky, A.">
      <organization></organization>
    </author>
    <author initials="S." surname="M." fullname="Schapira, M.">
      <organization></organization>
    </author>
    <author initials="S." surname="D." fullname="Shahaf, D.">
      <organization></organization>
    </author>
    <author initials="T." surname="A." fullname="Tamar, A.">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
<annotation>ACM HotNets</annotation></reference>
<reference anchor="Xu18" >
  <front>
    <title>Experience-driven networking: A deep reinforcement learning based approach</title>
    <author initials="X." surname="Z." fullname="Xu, Z.">
      <organization></organization>
    </author>
    <author initials="T." surname="J." fullname="Tang J.">
      <organization></organization>
    </author>
    <author initials="M." surname="J." fullname="Meng, J.">
      <organization></organization>
    </author>
    <author initials="Z." surname="W." fullname="Zhang, W.">
      <organization></organization>
    </author>
    <author initials="W." surname="Y." fullname="Wang, Y.">
      <organization></organization>
    </author>
    <author initials="L. C." surname="H." fullname="Liu, C. H.">
      <organization></organization>
    </author>
    <author initials="Y." surname="D." fullname="Yang, D.">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE INFOCOM</annotation></reference>
<reference anchor="tl1" >
  <front>
    <title>Transfer learning</title>
    <author initials="L." surname="Torrey" fullname="Lisa Torrey">
      <organization></organization>
    </author>
    <author initials="J." surname="Shavlik" fullname="Jude Shavlik">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
<annotation>Handbook of research on machine learning applications and trends: algorithms, methods, and techniques</annotation></reference>
<reference anchor="gnn1" >
  <front>
    <title>Relational inductive biases, deep learning, and graph networks</title>
    <author initials="P. W." surname="Battaglia" fullname="Peter W. Battaglia">
      <organization></organization>
    </author>
    <author initials="E." surname="al" fullname="Et. al">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>arXiv preprint arXiv:1806.01261</annotation></reference>
<reference anchor="gnn2" >
  <front>
    <title>Unveiling the potential of Graph Neural Networks for network modeling and optimization in SDN</title>
    <author initials="K." surname="Rusek" fullname="K. Rusek">
      <organization></organization>
    </author>
    <author initials="J." surname="Suárez-Varela" fullname="J. Suárez-Varela">
      <organization></organization>
    </author>
    <author initials="A." surname="Mestres" fullname="A. Mestres">
      <organization></organization>
    </author>
    <author initials="P." surname="Barlet-Ros" fullname="P. Barlet-Ros">
      <organization></organization>
    </author>
    <author initials="A." surname="Cabellos-Aparicio" fullname="A. Cabellos-Aparicio">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>ACM Symposium on SDN Research</annotation></reference>
<reference anchor="Rex06" >
  <front>
    <title>Route optimization in IP networks</title>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization></organization>
    </author>
    <date year="2006"/>
  </front>
<annotation>Handbook of Optimization in Telecommunications (pp. 679-700), Springer</annotation></reference>
<reference anchor="Kr14" >
  <front>
    <title>Software-defined networking: A comprehensive survey</title>
    <author initials="D." surname="Kreutz" fullname="D. Kreutz">
      <organization></organization>
    </author>
    <author initials="F. M." surname="Ramos" fullname="F. M. Ramos">
      <organization></organization>
    </author>
    <author initials="P. E." surname="Verissimo" fullname="P. E. Verissimo">
      <organization></organization>
    </author>
    <author initials="C. E." surname="Rothenberg" fullname="C. E. Rothenberg">
      <organization></organization>
    </author>
    <author initials="S." surname="Azodolmolky" fullname="S. Azodolmolky">
      <organization></organization>
    </author>
    <author initials="S." surname="Uhlig" fullname="S. Uhlig">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<annotation>Proceedings of the IEEE, vol. 103, no. 1, pp. 14-76</annotation></reference>
<reference anchor="XAI" >
  <front>
    <title>Explainable artificial intelligence: Understanding, visualizing and interpreting deep learning models</title>
    <author initials="W." surname="Samek" fullname="Wojciech Samek">
      <organization></organization>
    </author>
    <author initials="T." surname="Wiegand" fullname="Thomas Wiegand">
      <organization></organization>
    </author>
    <author initials="K.-R." surname="Müller" fullname="Klaus-Robert Müller">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
<annotation>arXiv preprint arXiv:1708.08296</annotation></reference>
<reference anchor="Zil20" >
  <front>
    <title>Interpreting Deep Learning-Based Networking Systems</title>
    <author initials="Z." surname="Meng" fullname="Zili Meng">
      <organization></organization>
    </author>
    <author initials="M." surname="Wang" fullname="Minhu Wang">
      <organization></organization>
    </author>
    <author initials="J." surname="Bai" fullname="Jiasong Bai">
      <organization></organization>
    </author>
    <author initials="M." surname="Xu" fullname="Mingwei Xu">
      <organization></organization>
    </author>
    <author initials="H." surname="Mao" fullname="Hongzi Mao">
      <organization></organization>
    </author>
    <author initials="H." surname="Hu" fullname="Hongxin Hu">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>ACM SIGCOMM</annotation></reference>
<reference anchor="Mor18" >
  <front>
    <title>Ray: A Distributed Framework for Emerging AI Applications</title>
    <author initials="P." surname="Moritz" fullname="Philipp Moritz">
      <organization></organization>
    </author>
    <author initials="R." surname="Nishihara" fullname="Robert Nishihara">
      <organization></organization>
    </author>
    <author initials="S." surname="Wang" fullname="Stephanie Wang">
      <organization></organization>
    </author>
    <author initials="A." surname="Tumanov" fullname="Alexey Tumanov">
      <organization></organization>
    </author>
    <author initials="R." surname="Liaw" fullname="Richard Liaw">
      <organization></organization>
    </author>
    <author initials="E." surname="Liang" fullname="Eric Liang">
      <organization></organization>
    </author>
    <author initials="M." surname="Elibol" fullname="Melih Elibol">
      <organization></organization>
    </author>
    <author initials="Z." surname="Yang" fullname="Zongheng Yang">
      <organization></organization>
    </author>
    <author initials="W." surname="Paul" fullname="William Paul">
      <organization></organization>
    </author>
    <author initials="M." surname="Jordan" fullname="Michael Jordan">
      <organization></organization>
    </author>
    <author initials="I." surname="Stoica" fullname="Ion Stoica">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>USENIX Symposium on Operating Systems Design and Implementation (OSDI)</annotation></reference>
<reference anchor="Puj21" >
  <front>
    <title>NetXplain: Real-time explainability of Graph Neural Networks applied to Computer Networks</title>
    <author initials="D." surname="Pujol-Perich" fullname="David Pujol-Perich">
      <organization></organization>
    </author>
    <author initials="J." surname="Suárez-Varela" fullname="José Suárez-Varela">
      <organization></organization>
    </author>
    <author initials="S." surname="Xiao" fullname="Shihan Xiao">
      <organization></organization>
    </author>
    <author initials="B." surname="Wu" fullname="Bo Wu">
      <organization></organization>
    </author>
    <author initials="A." surname="Cabello" fullname="Albert Cabello">
      <organization></organization>
    </author>
    <author initials="P." surname="Barlet-Ros" fullname="Pere Barlet-Ros">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>MLSys workshop on Graph Neural Networks and Systems (GNNSys)</annotation></reference>
<reference anchor="Li19" >
  <front>
    <title>A Framework for Qualitative Communications Using Big Packet Protocol</title>
    <author initials="R." surname="Li" fullname="Richard Li">
      <organization></organization>
    </author>
    <author initials="K." surname="Makhijani" fullname="Kiran Makhijani">
      <organization></organization>
    </author>
    <author initials="H." surname="Yousefi" fullname="Hamed Yousefi">
      <organization></organization>
    </author>
    <author initials="C." surname="Westphal" fullname="Cedric Westphal">
      <organization></organization>
    </author>
    <author initials="L." surname="Dong" fullname="Lijun Dong">
      <organization></organization>
    </author>
    <author initials="T." surname="Wauters" fullname="Tim Wauters">
      <organization></organization>
    </author>
    <author initials="F. D." surname="Turck." fullname="Filip De Turck.">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>ACM SIGCOMM Workshop on Networking for Emerging Applications and Technologies (NEAT)</annotation></reference>
<reference anchor="Hir15" >
  <front>
    <title>Crowdsourced network measurements: Benefits and best practices</title>
    <author initials="M." surname="Hirth" fullname="Matthias Hirth">
      <organization></organization>
    </author>
    <author initials="T." surname="Hossfeld" fullname="Tobias Hossfeld">
      <organization></organization>
    </author>
    <author initials="M." surname="Mellia" fullname="Marco Mellia">
      <organization></organization>
    </author>
    <author initials="C." surname="Schwartz" fullname="Christian Schwartz">
      <organization></organization>
    </author>
    <author initials="F." surname="Lehrieder" fullname="Frank Lehrieder">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<annotation>Computer Networks. 90</annotation></reference>
<reference anchor="Bri19" >
  <front>
    <title>Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic</title>
    <author initials="P.-O." surname="Brissaud" fullname="Pierre-Olivier Brissaud">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="I." surname="Chrisment" fullname="Isabelle Chrisment">
      <organization></organization>
    </author>
    <author initials="T." surname="Cholez" fullname="Thibault Cholez">
      <organization></organization>
    </author>
    <author initials="O." surname="Bettan" fullname="Olivier Bettan">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IEEE Transactions on Network and Service Management, 16 (3)</annotation></reference>
<reference anchor="Hoo18" >
  <front>
    <title>Updated Taxonomy for the Network and Service Management Research Field</title>
    <author initials="J. V. D." surname="Hooft" fullname="Jeroen Van Der Hooft">
      <organization></organization>
    </author>
    <author initials="M." surname="Claeys" fullname="Maxim Claeys">
      <organization></organization>
    </author>
    <author initials="N." surname="Bouten" fullname="Niels Bouten">
      <organization></organization>
    </author>
    <author initials="T." surname="Wauters" fullname="Tim Wauters">
      <organization></organization>
    </author>
    <author initials="J." surname="Schönwälder" fullname="Jürgen Schönwälder">
      <organization></organization>
    </author>
    <author initials="A. P. B." surname="Stiller" fullname="Aiko Pras, Burkhard Stiller">
      <organization></organization>
    </author>
    <author initials="M." surname="Charalambides" fullname="Marinos Charalambides">
      <organization></organization>
    </author>
    <author initials="R." surname="Badonnel" fullname="Rémi Badonnel">
      <organization></organization>
    </author>
    <author initials="J." surname="Serrat" fullname="Joan Serrat">
      <organization></organization>
    </author>
    <author initials="C. R. P. D." surname="Santos" fullname="Carlos Raniery Paula Dos Santos">
      <organization></organization>
    </author>
    <author initials="F. D." surname="Turck" fullname="Filip De Turck">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>Journal of Network System Managemen (JNSM) 26, 790–808</annotation></reference>
<reference anchor="Bou18" >
  <front>
    <title>A comprehensive survey on machine learning for networking: evolution, applications and research opportunities</title>
    <author initials="R." surname="Boutaba" fullname="Raouf Boutaba">
      <organization></organization>
    </author>
    <author initials="M. A." surname="Salahuddin" fullname="Mohammad A. Salahuddin">
      <organization></organization>
    </author>
    <author initials="N." surname="Limam" fullname="Noura Limam">
      <organization></organization>
    </author>
    <author initials="S." surname="Ayoubi" fullname="Sara Ayoubi">
      <organization></organization>
    </author>
    <author initials="N." surname="Shahriar" fullname="Nashid Shahriar">
      <organization></organization>
    </author>
    <author initials="F." surname="Estrada-Solano" fullname="Felipe Estrada-Solano">
      <organization></organization>
    </author>
    <author initials="O. M." surname="Caicedo" fullname="Oscar M. Caicedo">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>Journal of Internet Services and Applications 9, 16</annotation></reference>
<reference anchor="Kaf19" >
  <front>
    <title>Automation of 5G Network Slice Control Functions with Machine Learning</title>
    <author initials="V. P." surname="Kafle" fullname="V. P. Kafle">
      <organization></organization>
    </author>
    <author initials="P." surname="Martinez-Julia" fullname="P. Martinez-Julia">
      <organization></organization>
    </author>
    <author initials="T." surname="Miyazawa" fullname="T. Miyazawa">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IEEE Communications Standards Magazine, vol. 3, no. 3, pp. 54-62</annotation></reference>
<reference anchor="Yan20" >
  <front>
    <title>Artificial-Intelligence-Enabled Intelligent 6G Networks</title>
    <author initials="H." surname="Yang" fullname="H. Yang">
      <organization></organization>
    </author>
    <author initials="A." surname="Alphones" fullname="A. Alphones">
      <organization></organization>
    </author>
    <author initials="Z." surname="Xiong" fullname="Z. Xiong">
      <organization></organization>
    </author>
    <author initials="D." surname="Niyato" fullname="D. Niyato">
      <organization></organization>
    </author>
    <author initials="J." surname="Zhao" fullname="J. Zhao">
      <organization></organization>
    </author>
    <author initials="K." surname="Wu," fullname="K. Wu,">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>IEEE Network, vol. 34, no. 6, pp. 272-280</annotation></reference>
<reference anchor="Lop20" >
  <front>
    <title>Priority Flow Admission and Routing in SDN: Exact and Heuristic Approaches</title>
    <author initials="J." surname="López" fullname="J. López">
      <organization></organization>
    </author>
    <author initials="M." surname="Labonne" fullname="M. Labonne">
      <organization></organization>
    </author>
    <author initials="C." surname="Poletti" fullname="C. Poletti">
      <organization></organization>
    </author>
    <author initials="D." surname="Belabed" fullname="D. Belabed">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>IEEE International Symposium on Network Computing and Applications (NCA)</annotation></reference>
<reference anchor="Sen04" >
  <front>
    <title>Accurate, scalable in-network identification of p2p traffic using application signatures</title>
    <author initials="S." surname="Sen" fullname="Subhabrata Sen">
      <organization></organization>
    </author>
    <author initials="O." surname="Spatscheck" fullname="Oliver Spatscheck">
      <organization></organization>
    </author>
    <author initials="D." surname="Wang" fullname="Dongmei Wang">
      <organization></organization>
    </author>
    <date year="2004"/>
  </front>
<annotation>ACM International conference on World Wide Web (WWW)</annotation></reference>
<reference anchor="Rin17" >
  <front>
    <title>IP2Vec: Learning Similarities Between IP Addresses</title>
    <author initials="M." surname="Ring" fullname="M. Ring">
      <organization></organization>
    </author>
    <author initials="A." surname="Dallmann" fullname="A. Dallmann">
      <organization></organization>
    </author>
    <author initials="D." surname="Landes" fullname="D. Landes">
      <organization></organization>
    </author>
    <author initials="A." surname="Hotho" fullname="A. Hotho">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
<annotation>IEEE International Conference on Data Mining Workshops (ICDMW)</annotation></reference>
<reference anchor="Evr19" >
  <front>
    <title>port2dist: Semantic Port Distances for Network Analytics</title>
    <author initials="L." surname="Evrard" fullname="Laurent Evrard">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="J.-N." surname="Colin" fullname="Jean-Noël Colin">
      <organization></organization>
    </author>
    <author initials="F." surname="Beck" fullname="Frédéric Beck">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IFIP/IEEE Symposium on Integrated Network and Service Management (IM)</annotation></reference>
<reference anchor="Sol20" >
  <front>
    <title>A Graph Neural Network Approach for Scalable and Dynamic IP Similarity in Enterprise Networks</title>
    <author initials="H. M." surname="Soliman" fullname="Hazem M. Soliman">
      <organization></organization>
    </author>
    <author initials="G." surname="Salmon" fullname="Geoff Salmon">
      <organization></organization>
    </author>
    <author initials="D." surname="Sovilij" fullname="Dusan Sovilij">
      <organization></organization>
    </author>
    <author initials="M." surname="Rao" fullname="Mohan Rao">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>IEEE International Conference on Cloud Networking (CloudNet)</annotation></reference>
<reference anchor="Sco11" >
  <front>
    <title>On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses</title>
    <author initials="S. E." surname="Coull" fullname="Scott E. Coull">
      <organization></organization>
    </author>
    <author initials="F." surname="Monrose" fullname="Fabian Monrose">
      <organization></organization>
    </author>
    <author initials="M." surname="Bailey" fullname="Michael Bailey">
      <organization></organization>
    </author>
    <date year="2011"/>
  </front>
<annotation>NDSS</annotation></reference>
<reference anchor="Xie18" >
  <front>
    <title>A survey of machine learning techniques applied to software defined networking (SDN): Research issues and challenges</title>
    <author initials="J." surname="Xie" fullname="Junfeng Xie">
      <organization></organization>
    </author>
    <author initials="F. R." surname="Yu" fullname="F. Richard Yu">
      <organization></organization>
    </author>
    <author initials="T." surname="Huang" fullname="Tao Huang">
      <organization></organization>
    </author>
    <author initials="R." surname="Xie" fullname="Renchao Xie">
      <organization></organization>
    </author>
    <author initials="J." surname="Liu" fullname="Jiang Liu">
      <organization></organization>
    </author>
    <author initials="C." surname="Wang" fullname="Chenmeng Wang">
      <organization></organization>
    </author>
    <author initials="Y." surname="Liu" fullname="Yunjie Liu">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Communications Surveys &amp; Tutorials</annotation></reference>
<reference anchor="Yu14" >
  <front>
    <title>Distributed and collaborative traffic monitoring in software defined networks</title>
    <author initials="Y." surname="Yu" fullname="Ye Yu">
      <organization></organization>
    </author>
    <author initials="C." surname="Qian" fullname="Chen Qian">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xin Li">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
<annotation>ACM Hot topics in software defined networking</annotation></reference>
<reference anchor="Dij19" >
  <front>
    <title>A Survey of Network Traffic Anonymisation Techniques and Implementations</title>
    <author initials="N. V." surname="Dijkhuizen" fullname="Niels Van Dijkhuizen">
      <organization></organization>
    </author>
    <author initials="J. V. D." surname="Ham" fullname="Jeroen Van Der Ham">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xin Li">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
<annotation>ACM Comput. Surv. 51, 3, Article 52</annotation></reference>
<reference anchor="Sch21" >
  <front>
    <title>Distributed Online Service Coordination Using Deep Reinforcement Learning</title>
    <author initials="S." surname="Schneider" fullname="Stefan Schneider">
      <organization></organization>
    </author>
    <author initials="H." surname="Qarawlus" fullname="Haydar Qarawlus">
      <organization></organization>
    </author>
    <author initials="H." surname="Karl" fullname="Holger Karl">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>IEEE International Conference on Distributed Computing Systems (ICDCS)</annotation></reference>
<reference anchor="Hui22" >
  <front>
    <title>Knowledge Enhanced GAN for IoT Traffic Generation</title>
    <author initials="S." surname="Hui" fullname="Shuodi Hui">
      <organization></organization>
    </author>
    <author initials="H." surname="Wang" fullname="Huandong Wang">
      <organization></organization>
    </author>
    <author initials="Z." surname="Wang" fullname="Zhenhua Wang">
      <organization></organization>
    </author>
    <author initials="X." surname="Yang" fullname="Xinghao Yang">
      <organization></organization>
    </author>
    <author initials="Z." surname="Liu" fullname="Zhongjin Liu">
      <organization></organization>
    </author>
    <author initials="D." surname="Jin" fullname="Depeng Jin">
      <organization></organization>
    </author>
    <author initials="Y." surname="Li" fullname="Yong Li">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>ACM Web Conference 2022 (WWW)</annotation></reference>
<reference anchor="Sil16" >
  <front>
    <title>Mastering the game of Go with deep neural networks and tree search</title>
    <author initials="D." surname="Silver" fullname="David Silver">
      <organization></organization>
    </author>
    <author initials="A." surname="Huang" fullname="Aja Huang">
      <organization></organization>
    </author>
    <author initials="C. J." surname="Maddison" fullname="Christopher J. Maddison">
      <organization></organization>
    </author>
    <author initials="A." surname="Guez" fullname="Arthur Guez">
      <organization></organization>
    </author>
    <author initials="L." surname="Sifre" fullname="Laurent Sifre">
      <organization></organization>
    </author>
    <author initials="G. V. D." surname="Driessche" fullname="George Van Den Driessche">
      <organization></organization>
    </author>
    <author initials="J." surname="Schrittwieser" fullname="Julian Schrittwieser">
      <organization></organization>
    </author>
    <author initials="I." surname="Antonoglou" fullname="Ioannis Antonoglou">
      <organization></organization>
    </author>
    <author initials="V." surname="Panneershelvam" fullname="Veda Panneershelvam">
      <organization></organization>
    </author>
    <author initials="M." surname="Lanctot" fullname="Marc Lanctot">
      <organization></organization>
    </author>
    <author initials="S." surname="Dieleman" fullname="Sander Dieleman">
      <organization></organization>
    </author>
    <author initials="D." surname="Grewe" fullname="Dominik Grewe">
      <organization></organization>
    </author>
    <author initials="J." surname="Nham" fullname="John Nham">
      <organization></organization>
    </author>
    <author initials="D." surname="Silver" fullname="David Silver">
      <organization></organization>
    </author>
    <author initials="I." surname="Sutskever" fullname="Ilya Sutskever">
      <organization></organization>
    </author>
    <author initials="T." surname="Lillicrap" fullname="Timothy Lillicrap">
      <organization></organization>
    </author>
    <author initials="M." surname="Leach" fullname="Madeleine Leach">
      <organization></organization>
    </author>
    <author initials="K." surname="Kavukcuoglu" fullname="Koray Kavukcuoglu">
      <organization></organization>
    </author>
    <author initials="T." surname="Graepel" fullname="Thore Graepel">
      <organization></organization>
    </author>
    <author initials="D." surname="Hassabis" fullname="Demis Hassabis">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
<annotation>Nature, vol. 529 (2016), pp. 484-503</annotation></reference>
<reference anchor="Nas21" >
  <front>
    <title>Defeating DNN-Based Traffic Analysis Systems inReal-Time With Blind Adversarial Perturbations</title>
    <author initials="M." surname="Nasr" fullname="M. Nasr">
      <organization></organization>
    </author>
    <author initials="A." surname="Bahramali" fullname="A. Bahramali">
      <organization></organization>
    </author>
    <author initials="A." surname="Houmansadr" fullname="A. Houmansadr">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>USENIX Security Symposium</annotation></reference>
<reference anchor="Jmi22" >
  <front>
    <title>Adversarial machine learning for network intrusion detection: A comparative study</title>
    <author initials="H." surname="Jmila" fullname="H. Jmila">
      <organization></organization>
    </author>
    <author initials="M. I." surname="Khedher" fullname="M. I. Khedher">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>Computer Networks</annotation></reference>
<reference anchor="Fre15" >
  <front>
    <title>Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures</title>
    <author initials="M." surname="Fredrikson" fullname="M. Fredrikson">
      <organization></organization>
    </author>
    <author initials="M. S." surname="Jha" fullname="M. S. Jha">
      <organization></organization>
    </author>
    <author initials="T." surname="Ristenpart" fullname="T. Ristenpart">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<annotation>ACM SIGSAC Conference on Computer and Communications Security</annotation></reference>
<reference anchor="Bis23" >
  <front>
    <title>Hyperparameter optimization: Foundations, algorithms, best practices, and open challenges</title>
    <author initials="B." surname="Bischl" fullname="B. Bischl">
      <organization></organization>
    </author>
    <author initials="M." surname="Binder" fullname="M. Binder">
      <organization></organization>
    </author>
    <author initials="M." surname="Lang" fullname="M. Lang">
      <organization></organization>
    </author>
    <author initials="T." surname="Pielok" fullname="T. Pielok">
      <organization></organization>
    </author>
    <author initials="J." surname="Richter" fullname="J. Richter">
      <organization></organization>
    </author>
    <author initials="S." surname="Coors" fullname="S. Coors">
      <organization></organization>
    </author>
    <author initials="J." surname="Thomas" fullname="J. Thomas">
      <organization></organization>
    </author>
    <author initials="T." surname="Ullmann" fullname="T. Ullmann">
      <organization></organization>
    </author>
    <author initials="M." surname="Becker" fullname="M. Becker">
      <organization></organization>
    </author>
    <author initials="A.-L." surname="Boulesteix" fullname="A.-L. Boulesteix">
      <organization></organization>
    </author>
    <author initials="D." surname="Deng" fullname="D. Deng">
      <organization></organization>
    </author>
    <author initials="M." surname="Lindauer" fullname="M. Lindauer">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
<annotation>Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 13(2)</annotation></reference>


    </references>


<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>This document is the result of a collective work. Authors of this document are the main contributors and the editors but contributions have been also received from the following people we acknowledge: Laurent Ciavaglia, Felipe Alencar Lopes, Abdelkader Lahamdi, Albert Cabellos, José Suárez-Varela, Marinos Charalambides, Ramin Sadre, Pedro Martinez-Julia and Flavio Esposito</t>

<t>This document is also partially supported by project AI@EDGE, funded from the European Union's Horizon 2020 H2020-ICT-52 call for projects, under grant agreement no. 101015922.</t>

<t>The views expressed in this document do not necessarily reflect those of the Bank of Canada's Governing Council.</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA7y9W28jWZYu9q5fEa6CDWlMMlNZd8HwtFLKi6okpVpSVVb1
wXkIkptkVAYjOHGRkpkooP/DeT0GbMAYY+BHG346T65/0r/E61uXvXcEL5U1
58CD6W4lGYzYsS/r+q1vDYfDgyZrcneS3LrapdVkkZwt0jx3xdzVSVYkZ2W7
yrNinpxWTTbLJlmaJxdF4/I8m7ti4pK0mCbXrnksq3fJVVqkc7d0RXOQjseV
eziJfn/BlxZ66TJcOkkbNy+r9Qk9b1YeTMtJkS5pRNMqnTXDrGpmw2JZzYdp
Npz4sQ2fPjuo2/Eyq+usLJr1in5wcXv/8iBbVSdJU7V18+zp0+/oqoPPi3Y5
dtXJwedTehL9z6QsalfUbc0XuoPPaZxfHHyeVi49SU5vX5weYIjzioZ+wi9b
0ajDBN2n9bvkZVnRyyfJwTu3pqunJwfJcNvL0adpmLksmjl8tUwni6xwSU53
LmiWaCiuaDHGJNHnv32Ff8gLvqWbYy5f4St8vEyzHJf8xb1Pl6vcjSblEp9j
nCfJomlW9cmTJ9GXT+R286xZtOOT5Me7F7dPbl/cvMGHOc1O3Wz/2eXp/Yu7
+4ODSTmlAZwkLS3Ktwer7ISmIPk8maRF0ta0GaoqXSeH2SyhdUrWrj5KyipZ
pPUiWbjK4SnDpCkn8kddVk3lZrX+a73kfyS44AQ/pj/tkhN+zNTN0jZvarrC
vpcfyeUHadssSlro4QGGNWvzXHbS97//W/X7/710ycsqLX7/P8qs5gvKap4W
2Ye0oR1Ec1FkD66qs2adlLPksn3vluOyrea8bS+KKkv5R07m/FdXlUs3mtEN
J3S/v7RFNspbvqKmETuax6+T29Yltxlt2mqKgzB1xaJ8cMMf0txV84wvntDz
TqKnyYdlWzRV93N+p/BKpzktTzF1VXKWu+XyYON1XrZNW7lHlyX3brIoyryc
Z64e0JtMRgfxM368Oz0I75W308ds/pcJbjoq9bnhsefZMmuqLLlJV+lU/i7x
1t1nf3F9mY6T5y6fZ+1SDg4Ei8NROvDv7Fra7AfRSPQHB34wq/gpI/1rNHZ/
meN73uzd4d01rsjK5CWdWExOvTEyjKGig/g8Ld5hmc/opE7TeBD+Ex1Dzbcc
zeyWf8mcc1tmhh49o1NwR3Ptsim/Z/fR5xmdOnr0Ld32Eafk/O78KEmb5Ny1
TT1ZOBrUojMfr1xFkmRNHz26cTiXNT9pXNuTRnKaR1n5pDPszkV/KdsmL8t3
PGkHRUl3bmi/nxzQT25fnn3z9Pj4RP789rtvv9Y/v/vi+Cv8if+HbI5/dDE8
HwXZrJJvOJWXHDaPWTFkKYRrryaT77444a2t2uaze7zv3Tkt8eQdCddZltPe
OElSkqGPLL6yxk2wgxN6LGRLNczdg8vtB5N0hW8/45vauU/4/4b6v0niV+bB
0RhoZQu345qfaOm+TyfluC4L/opVRXL83XdfyBMKWsHPSFxeX/ycvIUYp4NX
FrQrIMo/O8Bb0nO+e9Z5y1Na9HRelHVWJy/er1zVJHdrWpklv5RpzXvSc6Qf
Yu35xy91TjuLZuMOymnHJTdVWa8wzoVblm2Wd9/rWfReOhKSDj+UYzegmVil
xWd4p9Px9Pjp/1/v9EO6TKs2TytSlwUeTQPJddybV1+1i3S5TKfJ6yxfZvpj
0k67Li/pcrr6usQ2LmhkdeXeRXPy7Onx02hOLl68eMH6ms49DjCd3Ilf8KQs
TNlDH0ND+PNBXzUmcdc8ic/d/Pi77vY/d251Vs5hH82LDIdqixEF++suzyZu
mnz1yr6vk0c67gluQCJUzIZPOQXnI4wj3TU7IzIqaH7mebbnkpdZWe06Qacj
CNXJot7x/c8jete6SYc3NIUfuvP+XX/eL65fvjl7cyWzV9bHPeFBxtcj6VRM
/dI16bKsVgtsSNJ6ad0kq6qcV9gb49yRidRMFsN0wgtD30wcWYz0Q5pb6GW6
j4iYu/PrT5nGGxLYNKKaftvsuOQVWajJq2w83vH967YY3rnyXfJDttx1C0e6
w5FUquYL0p47rrrOJrRdJj+48nHnrofxWSQXHz7Qu+64RrVlSSfq12yyc/lT
2puvy6qk7ddbvlhEnp5dJXcXr2jxwup92V295ObLE79GWAr6m0y+Mh9mpGBX
jv6L9r7KeV2xsqr/G60OCU76T77+dy5eZ0KH//6F+d4VRUbShKyj97T9dq3N
WUlbmGyK3GHTslWx66Xu0zxdT8odVySnNNW0oRa0av9Vm+48fcimyds0f6ej
8dvgy2gb6Bag8S9XbYOjv1y2xYje9mGUfPklb43ztDn+trs1br581dK80lPo
fecQbbRZSK7UJAJfZmTOklvxKfvgdoS7N7v28h0NaFFmuyUZffs4pU20a5f8
MqKtVr0bdCfg274Yu8pysoaqtb4+HS5IoTqyHJLDq4tLmqkjnhHS1H1FcfPl
8EUBQTaFeCXbfErCP6iIT5mMX/A+btdGvBwlv+z88u2IVrqY79qcuHG7+3t6
8GXW7v7xPXnh892a4LTOSFukEzjPXju+IYtDZxFaN1KWd+vlipQAORyHpzfX
b67ubE7T/i578648IduFDHtWIXTLInm4I7lGTgor17uGxkOmPe05mKWfKHro
enoYbdty13T+kJK3nyaX6Ydq1+bb4apuXni/yMZwhumo5Mt011Vv8uwhIynz
kjz7stq9XVls+wkkTUnqMEQ8Du/e3N3KdE4+jJ91DcLPthguz55+8fSkv1a0
65uqzOF22U9wXXLnqgcycj5plnE2zd/d8jVslFHytwUZx7slw3NyhdJx2pmM
Z7Hpd7eqWNgm35PnDcMvGjFeROzdOn7hw++v7/QQv27T/iE+nU4rNTsa8nsu
SUMNrxz5smQgZzVbKLLxTqfk1sAYxCXk49Nm+tRTjiOOZ+88jXd8VGcuw/zs
mh6S63BtSJeMy2aXorjK5i35Hqc0R/Ck2yard4vaRbYY/tImd+2uQ3GWVnlZ
J69a2qLVTvP9+7Kmc9nWNRnc091Ld3F2eymzRf9Fv3n2bGOv3r44s9Uckjh1
ZAma+5rcviDf9SHNW6eai7fv6FPm/4r0zcI91njqLt353/L87znZz2LfLhGD
uuPInHUcGdvad+WsIXNYAxbJIX2Oj47Eu7107tlxzwx3bjomM23o4Otl4rHQ
c2Bs0x6uHPtEEzkhFuJMHrKUvsrTseO4sIMPmflQclvU7QoCASp/VblhU6XZ
p/o4P4wwzN2K7m5Jh2yX/B6Rxzl2Lu9O5XE0lWn1c/aAQUE+NAn/8+TZ8dOv
R0+/evrdMZ/+y2xD3by8GT6/vj5JntPa0+w6BMFbBKFs19Fkv7x5dfpJsQw+
xHjKnnNetuss+WXnUbp02bjco5nfpuuCJFD7bucD0vLXtkjeumy3QrmmVySb
HmeIFm+Q/FTmLe3qZ998pdPUHn/d08r00Dsy+UkWNmVy25Lhe79wS5KCObIT
DR0ddrZtu77My0fy6sl7LiGuRYAiiEuffcpU/i0t32c8l7sm4rRo6PYs58u2
3nkSX1WcvqBXrOp0j5H+0zqtSdm9S3dekHO0s0qeV+kDx/668/t1X2F7I9sH
onAB5veXtOhvwxc5+cakcWqe45MkNV2DYzeD31zEUnHp0rqt+Ox+kma+L2ku
f9m9Lb/PHP1n9/c3bu9a/LXdr92+b4sPiyx5Ve62RnFw/rYodz3hts1Is6W7
HKif6aul7Jdd54LjjD8uSGv/gaG1bd2waq/aVX/V7khgN+lJ8i+tq9bDaUUL
VnCGIeXBmAhpHFlFZFGsP8mIqlZZg4ft1Nq35Th5nVZVVu+0ZckRnpSIlmc7
bS12g1/SSOtm56H4RD9Y7ZK3WZ4HP/jPTzANeuNYvF/lZQYhxS4B23svHrDr
OSxENjAZgaSc2DQTzQhHOqualjUpJByNLE6Dqn34SV6Dm1alBhXch+H37e74
20+kOEhJ/ZDO8l0q7nVWlem7DEuX7pHNbBHck31RS1isjq0ANnDFIo8MXBbg
o+T4q0FyPUqeDT6Tx+qc9j0CzClpbTeNUsVNbC6fu0lW85OjufQBzs5c5p/q
Gvw3nkoyB+rUTfe4CV0r6qIoyge/P87ysp1ytk2zx9E7yQsil1svylWdHF6c
XVwfxTPa1v1delok5QNWxT3iYelqlWs0Ac5JP40sAeiMZAZPcElyfhLsjU+a
TXKjaBiksie7Tjc58LfkI5TkRO+SM6PkOt0lji/oASmNqq13Sdxz8uTIx90l
OcjXu23J8NwpfuiC+xJGrwWtdx+GXnzmrq0e3LpO/ofkvoV1kea0lM+OD58d
DZLjL779Ynj85dNvR5/pcl3P240D4A1i8qOHY45fNZoSWQaTBYHE8t6vi5gw
07JF3HqKAP9fzTP5JA08Sl6NMJr1zngOXfLTKLlZpLsuoDmna16XuxUtfX39
B0+hnXFXDi+61kvXTduTV5kEx4u+o5+nfF7qkhEUhU9VmZeuov0+LfqrcEYW
T43oEd9siH+QYJ6SLUG6FOkxywV0Mld/RpPSfNNz5+lOd+4KITKSxnm6HGeS
kN5xn5v0Id9pm5xxeuZDtnfdWprAavecb6TmgoHHE3xK071GVi+OTt5fnR7Z
PucZHnen+KKg3R2Jaz97SBTKMfqUecS9B2RZfdgXTrxrB97n2GLO06YmP+Nv
C1esd64G2XADskKL+Trb+RiyQQds7b3fdZvLjLTgXsWgRoEJfFKc335N//V0
dExWvM3nT2l+/E13Oi+9AC+TqqR7fMrk0X3Ilq/qd+sBidxdkzdZpKusSge0
JXddskgX6WxAe2nX0UeK1T/DS9NvetbX67KhF6/tNX9ut5hc6vKbQRtyqdg3
LPp2RA9ElpL+I0tnsviU6fmZlvNvu1+J7vn9rm+vHLbUzq91y73d9f1b/vqX
XV/zRqOT/XrXBb/w7897072hvCxZmuiEN3kvTsOmHmzs/E/kiy+zOoX+rNyu
JMj3LbmJtGke8mxPHv01iYdxWTLaprKAMon5DZslsmnEQiInp5jW5Kjm5F6T
ZlyS0CfZsihhWPEF3srx7z4vit7L37rcdElWTFsJTY0z2kZ0F95pNgK56bxK
V4s/ZSrdOHZNkP9umn0Z9M9eNCN6m892r+fWCNPxt4gwHT/7WiJM9Iq9oOaP
xYPLcosur8qGTkwmYetX/DbXEm/y9if0nccqllMJxOHlYSkuLQCYFZ+aFP8B
pljtdgWMvid7oP39f6vIKv8pRehvt714hSDwTjV5gzmuctcMb8td1yBDgNhi
XtbD0xVp5klWdie8k2Pal/fg6Sa/9GkvUnULybwxVxc3f2rXbHV8bYxPv95x
gt70Hgp9O+kar4er1Sj5+pvvht88fXoUmUl4mR+qfjJeg74kid2MPbauKIYx
VjnSqTWOTf3JCp3skR8q1ypSYLt7QZsmXe5cR1rrF2StkqIgG225y0c446vI
D6Ehjl2103Qgb+5DOS3zZZm/2yXP6KItwZuvopVgk9EhaVhjMXDaIIEHyQM7
x0+/GCRFSX8MEqzB8ZfDb77maf/59GKrg8wAlR3wYABSp66qm5SzlPSMrCYv
OfsQAEckdmhxOHTREWRypj9pF74tfyU/hSTyHf1z1/m9X5TLtE7eZm6eFrsi
ND/kaVvTuRwDEXb1+3/J836UJrYTtgu6b8irevrts+9k1v6W5X2L/iJ+5w4E
aigggesAyvoTURh6UsbKfqfdWCzafZnw70mfIP75fGdijW4xBxj3510m/mv6
/Qcaxc4AJC54nyEKutvy7KNvrsqNeNdtuhYQH7Jt4xb+0MuKHsDKAIrhxRLg
ZEHsn0Y6eetE2mFd0AyuVnheFs58CCZiT1xn9SKDL9T7+q5xKyRsXWeCTZrn
7r1bk2+zTIvyoX9jhVZfZulj76sXyK12siTepMuzRfIiz8Zl3vvqbzTBC9eL
Yts5QeAxXXKWv39HjMLlyfckxIN/ZlEOqJSmNFjVVqWvqNKOGtLUedjGiogR
MDpg+TCLNVH35u78grw0LPhN+2s/S0dH4meWNsiiAJqbLR2ybiKAgFBZ77YU
2ChD8KJMNryaT9IDjBaiUZU5gH80VbtOUFn//m+fZiYgpZwW7KLtuOJ5mbzd
mdTJeTeqjbDTpKtc39TYmhK8uqT1SR41loeV2zGPEWzg8NX1Nf19pIkwAwtE
wb7eifwr5H7D0Ot+pOpHjl88z+a0Mxkvd6NYus/0nt3lid802ThFey76gVxH
YGbfLbJfA7hi25Wv6b+nyS8l2YOzfdeduSnO6Fsy+Oj453uuvMyQbTwPmZ1t
F91nS5If2J/1nqteQkzRUSKBUk3emd/Vswy3ZRLeRisc6ZiuvOw7MHHhRXJ4
/eL0XhEiWSW4+njRz6rycSq5hqhKKkrCoT6ioDlt5OZjx0hXRPB9gPxTlptx
CqSuMAqfDN86o+WYLytr8h3z6d5bIhV0BdMl3bfiC7LlyDHhIgmyOb2i2LpS
FSo0Lh39xk199qhnle0JuHz3VOCn1Zbzxf4wuQYW+dJ0x/AUsHakSKOsMknG
F8WkWq+gKN+6sYXPPn3CbzJHTvTQ8BrPYdCm7b753IkB2XbxRc2SzMn0eqT9
jjU10NjZoszdvvn3w3Xk0xb7D8q/K590/HVy+IWeh7I0KyVyald4Gh2i9H1Z
lMs1nzVY3PtvHEBrLzPatZ++TN+7qnQFF4Kc03vTmGb7ZvIqfU8S5yxP3Xrf
6lzTIGpGnPlo+b9fen3/+3+pyDfA8fn9/ykef//f83Aytl1/mr0rSSGk9SB5
3lbvWMrfNZm3zHe9GW38st4at96qP37/t2VGynJaFoXbJ8e/L3H06TCk+yZW
4WC3sAgRpaftmpLwr8lDKZry04V7f8t+29myW5B9WsXit5Ji+pJnXw+Sb757
+o+//6dvn36rmPZ2c79u95W3Rrqi8Au72Y7cxxYHZ7AZBAshs9WqrJoWxSJ/
RtzfpmU760Aed6x6qdU0pyOa6TxdtNNQS7N1Z9MMpqSbl+lyz1V3tIeS03XZ
jvfZAtcpuQZTDkBXWbpvc74k833lkhfkvKTTdHhX5uQX7BNj9SStOAuToo6m
/ORd4RO3hk6VHEm8PN9BiElYJZ1tseLaplz6FG0o4JGUtkfDvmwLFZqc/bvS
zdIt7fmUlUZir5vT3qqNRttT5FulEl2brdMP6WPan7ctCqCfQ0XggiQO4FPz
9AM9UMMkGiT5QoIkX305/PrZZwpZMnc/mkQfHBnGVeceEx/jC75+1XNNPmXW
Xo9id2+rFB2Rz7BalMVeKfi3ETkk+03U8xGpg3Xa7Nuv3zN6ed8VP4zItxn0
1kODAJ310LmwWf9Spv1rmfZn3zwbPvtWbKTLcrU58TdVBl9+LTC706kW2vMp
QPxT09d359eA0pPe529ek9uTsQl1qhmaPyOr6OUvf/+/VnvtEjrKl+m4DJWc
W3UIHQWyb5pmn9DhgjjAUKefMJndhHXHVbdjfWZgx01JcXh9diqmzp0rnn65
scknE5KlDR0QklY5BwUjTHKGciifxYYsWT1beTRBW/dyJwnCBClqY//EzN+1
40U6rpBrv9trqMAsJOvobpVyybJXs1snmI7D0mVxWMfHt7/c8LT2QQLI+8rJ
+gYsESb44du3b2U6b7PCUqhRkPDm2U9ucuJFaHKXLTNUlUJzwqB9dI7D9QrL
/1Pe0wjP/ANxcZ7m+ZLebP/mu7QK9T13el3SgPqy95s/2p5dYNI5VvWKMdRd
0NH5lc7ii4dqU33B2ng2zUAIcefobXCob+gzjhymBTRiDJtg9ABd8yfm8jJt
2QWjx4fixP9qf+h7lxbD6/L3/xPzkO81YV5Wv//blO5Nb/bcbVqMPR338uLm
CU925/Rj5ucVeyp/4JgcXmiBCBktWxTd1sCRF6NSomrSAU84X9NL0MhpH/v9
vYZIfiEx8qx2/x51mH6ADQwAT54t032z98qVsxlsxWW5d6e3Ncz+8oGs81//
wAAtYK7+aWnc3e6MvItjNIf8CX2gsz8pj4/7s/+mSAQOY0nUaEojF+F1WSMO
c5M1Mzri5FZdu8dECnk0Jf1iucoqBtsJnOZPCeFJ2TRIZ52Vbb7PkXqZjhFF
uSqLKtSabJ1TDU0/T7Pcp/H9/j7uTOz1+d2dVHr8nLlt7o05NPvhhlHAuNbU
YrKZWkwOyXA4ikiHyLpo1cYOHD9/wnJoaQvQbWno++Zt5IOdv7R7rrtPyw7W
fKtfRfuNDLU/eCID3iNU+/awmEOR1zzWk9uu+6Utfs1cdLMdTswnAhrF5m6P
N6yRODPE61HmJHXKSuLP21GMu5b6TyzhL27/onB921+zvSLpZxqKD2P36pJ7
CCXaoCs6tfsGz94X/fY8+3VbjP7On4c+su60KIs1Gcxij91Hh2MjefMnJkhC
SRyfyn59t2izD3sttX48a6+b/qkTZ+XceHfy3Y4HcOPgo01IK331zF6Gxezi
2YaYjbfWmyKHDDFFeVaWIHSQKZOsBud3bzswsD/yiuOkYp+Np3fF63RN7mny
17RKH/O23nJBmaMG9Ie0ynsT8+x488DttcCi1w5egk8HkSV2dme1o5lVLIZZ
+6EoH8nXnTtS7QtYXtPk1ek1WwRAD9uue+UKLbf9Eypn0ZbTDI/dZxO0YIf4
YwEF6OWiTf/oMtprc0jOP3C7/0Ye9/xX3pf7xMI5CCPmwHTuky1lXLfTK5OM
9ze8i2jtcE3kbdxluRWthdW5SlHdYnbDnJ7H2dRSwdzYw91yPw9uc4nBjDrL
lex7W06n0jge9gd+f03/UIFJNqZcLVDnjKDQdBpV+2y9a9Us2gqFuvscdLPq
77JZtU81erYJyCf6T0XOGVzKvVo+1+wRGWbNI/1g7yxclLSwWS1lfOU8oKu3
Rs/cNE1uwBDlqnrh8oe98hIZLzhwk4Y0SZLsW7I7YWk7z4CM3qu9zlFflr1D
PeHj3mkoF0Vyvdg7wGvabz+k+WQxpsUoYvm3+/Gftrcu8nVK8r+p37n9F95n
S/Je13Tu8jybkHOzdz6nND0a95zsy0r+UIJh8If0oX03aWlR99pxdJwc/CqS
EfneY+VIW5NGqGuyrE0V9MouvZ3MsRWNqn317LvkEJccSVjty2+/HH719Auc
6Ou07iMxzt3MCajj/PpaAUvBZlD0vamFrGC0xj3QGm8hSp6Tvpwmp1OQFKYw
4YBSoLGM98BzDrrveYWCnHpXQQ0zOC3AApXvqeh5XQKLU6fTXqlBjIowRIub
tOxCeY85lOYvs35pfvxm+1ImAL5VLQcjpw4kccyuJ+mXVK3Uummnn4RTfD3C
UHZCTWjCLkbJDws3hZjsvnBcZL8FG0Pfvqyc5fm9tgAyj4wFZpqkNzhtmnRC
KqFZpE2ipYisgRD1Iw10EbGKQW3QpqHNcgaGQFcpOuBTl56GM62yd3tKOkfA
QH6/2DUb9/CfwIe4MnqlrShJxU3cnZ71XfO4WLLvoehekQRbVj/rUX69Xq9c
hfVdMto6Bt+SY0fzMZUbDTpw8S5IYqAYZ1I3fSdz/+Q9H2FIk8VOKjp8X0x3
Frly0HpfRdUNaYdyD3wabuvuGlrQGZH5vAtJS78XBOfu5//YCVhuez03ebfz
+aej4SXTquQ03S57v+Oy8xE0/U6MJciCaBXbfg1TzC72FnEMsbXJWplkoBYG
v9KtQ2VkfdIJdmKxg+1MRvgEJZRrlPAdPmNWi+FwmKRj5BInzcHB/YLE77Sc
tMK9VzPCllaVgxkQOuW0pY0MMy9sH3yH25L0cckjfNQtdDiH11dHYDIb55Ds
S1JglfuXNiPlRL+egCHZKf/LDpLlw9OLI/JTJUtcj8h54mGUJCLJI5gO8K8K
UGLw3RXrZJpBqQDo4Z9KlvT1lcgZemjD70pTTL8neVmUybwsp+ERA/D2PspN
6X7+80TeE2Nlgi6kJVCeA2rWKGsNhmUm7mhosLteCvNAltYKY+SZLUoQfIZn
8TjL2vmXCC+O99VXh2qoYYvQ/SsHHC75VN0iwgnidjDLTy/iV1xV2UM6YRce
ZYakw6fmqWmmha5v0prk89hNYNnTL5bwU1PS/Re8R8gkplfO65KJTCZw8XiO
TVlhSUoGc9I3niclX3OArOWcvr4kP2hE27C0lM+a37XK5ouG3rDBgMLG4zUP
21ViFzQULZHRQqlS5ssjDISDm00YjlxcRXPL+/+RrDV6W7pxgSxUApFLT8xl
zdPpg4T+2YWhG4dbufdI/NGxC+sHEs8LLkCuYALTGy/oXXJ+H9lbSgpOw+Bt
OEZiJs1pFadrPRc4fHPHy03rTJ/lgL4xDi6ZVeWSXhg3pa8zjcSDsCe5K2V+
dDLSjE4ArYoDt4+YYOKtrehmkg+KpkISeBfxgYtI0SVShLo1uu9kwmGLeU5i
hczHdqkz8KCPqDuygieXtzzq+5wXJ71xyONpK4iEWmbTae4ODj7H8eGjwiup
//fxcxZNv0F+uWSmaALa9CTuVi4OT/UFEq025GGSp+SIDZKKNBSbWpjVKLxH
Q8VrksXBZQj8te1umrEHLuTXC2uN5kyFIrbhuDj/oq3p2dGN5GrR+dh62P8K
9LIwHG2cjx8ZG/bbb7S9IItrni5gPzJ9y5eAsw3EZJq3svyD5DQaMFnJbEPR
vh0Ek/Tw5dnpzd0R7fMliSk64GsWWogVse6Y+idEUwqGeLq0bUhrlGBOwVlZ
YxbI1en9jBXSCDzx9CKSMRtsIYj3pYy0PcCiTkdvomXL8f4SWegCsyxzeWs1
HE4Gzuk0my95htay0yqXA4CEqiq5LismOYr2UDEkLAL26FSyeUr5DtLUhYPZ
iUxGp9CJLvqX1rW6vUF7w9MBARhlAR4XZLBEZxqMMjQWSw7QyoKMhlZ6Qo5f
TerjnYZO5J4DK/sWn0j/uQxqve8fkDQu4kn1szGAZYdtRVazKCaj242XgE50
zqXhIH0IQopGOl6LqrTNqVIXOzQzJZEK0EfD5Uv4nFkES4mmJUyIbBnNk6ga
CCxaW7ZJ6bn0RlHWxIsLfuqcI4B5zmnAKNmywKbFU/m4KztXJpoBW5pfQpfm
6pIOHQPcfvuNJNDr8hGqVbQsTkojbFyBu8rGxeVLzNhl57dOZ45O2hjGOXJl
V+SWiQBMH7IcNlCOhDxNIpmN6ZhWYMGcX+WEJCO5NSPmYUnSGQx+0/CT9SR3
rMtx1rAdPMxqEKwFvQOvrDx0SdKInjnL3us6iUKdcRBa5wJNIZyaSFCaDGuZ
KE4rL8sV/xCHnrzZOkMmtp44kHqVpha85FJNyaJtLeMobRBwWyvsZkbK0BYz
Lco6LuVqZzodYmW1flfofC5TwM3JFBo/ZGVb52uz/iIVSqNlc4GmAo63N6eW
KR00W7qa7tSIXo33Kz8W74+GDnSPPiItOby6POJTjytL+l9WIPTGEBS0mtgq
VVvwtbS7osAnrCjclXT3BLXTTuR5JLvKR4aM1U1JF/D0qIyjvUhbUwVYTfed
M6MiWzQmJWoYfLUILR85OLz7SY7IA0ILZJAe9cp+ybi+vu5fsb36fJC4ZmKW
X0prMx7a+dlrufOWoo004e4Djb72jGy3mozex3SarkWtkNFBv0IgA7AUNXNF
68irY7zvvE+D8jmSBZpLGkQFztAQk5hkGV+aK16BW81B2/Oeow3I2pVn0ysZ
kVg8ctrx5SM7OmMoeMEfrEStJhHkm2aEg1e0VpFxnLs5bUAISNwCd5Xi1Rlk
DT1eTESVXd7CYzMJFKwMMrnCJbTmvDnoLurSgx/ErfJyjVVSAzY8oMbYWpaH
jdictrO9ocd48isxD2HnCCAI2sQTUeeS4rsa0HCVySVYuI9OhL04MJr1zh/E
M0PPFj2E3gVLVeu+lwlBHwjRlZAQLJ6x+rl7zyJcQ43ZiOQISRaRd8Lns0yD
p4RXLejAe6l0CElc5mvoPboOFV9HOj2ZvPSEXkSm9mbICfHgBlwUKkcnUiMf
+WPrFeZcRDdDmxeG99OdApcOI1kDe+/HSXOKri3sU4bojPyCBAUmsDQEgAg9
BrpIaZp5GvZvXn31xOm9eDB8+2TaOjOTyBejFZAqeNWV9SqFOL4oeC27fqU4
L6LkzFjjXR8wd5XygPEq8uzRh5a8NAwv8/+q1Hl5xr1vvLDNSTjQF0m6RDKK
T7YojcpBLJjp1bGd5qmqExLTiGTBlWqrRAu+m7WyFZ9fI39TrLvins3ZmtWA
r/Fn3zk253QGYP8BUXJxeUPiHTqS4bbIf17SENIKdWUmSo6Ujwf7nCQ5iY+l
SwvWyfF+gIcD5BJJBYjlGR1GmIsw3hk5ZA6P38X/wmVuZJrDHYK0ke1DHx0l
w5gWiBdezR6EU+vsg3sypc9YhPEvRslrxxY3lAbUBRt+H+SIknR5JAktDIjy
EUtKOvriMGd1//CSUcQg765RBFOgG2nwO0qca6wvzoOeslFyLnu08oWYUaQE
R20JcfLAU8vSoF7AMoxtEDs3GkAa004i122VTWFNK6naljPDl8AExzvjA/RZ
oa3SRlEbRI0cJ+/wQNIJtTjSDmYY20hQY7T3B7ICNE0ToCohh9kyiiRbkBqY
g7YWOcxmKjk1bgWDj45jcoo9PsA+QvDBggLqCYmjP+Fwy6nK8oEwxjaqa+T+
cNb1nx8/ch8WchmhUHktQRmMBYl/gVWZckmtim16CRc0xIPQleKtFrDWSugn
RYOxM/LoeJAAx7gJn8w0kDGWpNBZmMhZVokUBo13HbdZjvGlxTs+LAU9ryJ7
rqenRSDzBkghomQ/8zwGfwGqS81gkc9ssPjQZs9O8NwFfP+BDlKnHGutSrOV
Ciza8G8KH2qkKRGrxA6I+pJ2TsQlwc7okG/1HWH9dh27EjOyMlhBxarfYgTJ
qq1ItknAVfI+ScrJE/ndgD+3DZxhC/61vFNpyz6b39zynEM3IrcxHETh1DTx
WzgvKlaChIfwOFIDcEsU0hsH3feO9d2GO9zW6gtnIE1mF4A3IBxQLw1Nu3Fs
GQLeVZEnTQsdhQeyqltAlDGbGu0rtktFbTYc6etEi6MxBivTpAmQCjVkk3qp
Dw5y3Hvg9OchzOmjDZRDPwZgs1lCmsSM0ToItnI5PFlCOMgBImEydyFoCcOe
/IYWH4ZeLrRDX2aFCIel6kEN5CEuIQ6gN1k4fWkuHySqRqjsBdUQqVvoLrIq
aId4emGSwkzOR+fsnZM+dKs8FVeH/WrBmFupIsnsfAgPic4Jy1utJVJbbEKv
DGcg9qFBu56TrJkoTiTDaW0wYyRApLIMH7uqQtCnomOpNzMhJ/Fqb0aT0GIf
wsco6GfzNptKbCMtguhkKfJQZtiS9CJTUHLyZDFbknk9tLY0D0WpMVRSCFcy
t/xv5eoWESkmvUZR5E4QMrImLU4jHBZSYhP2zCWYqwIV79l5ONniTvIcyZiM
Q4hHMyDkumCgmfZTS1qldrD5S15TWdDYSWCFmy319lO9j8XEIYKzQtQ3nRLs
VhebnDBCZJ2NoHBTcbgHSUPaPlBxoqYKv4dKkSiGgbinHp464+icHGtwG9Vl
Yc+P3099kIrV9BAmBgemR8k1Hy0XjM2U/ZcgZUUDc2S/E+CBJF7wnpq6GQaU
Qm8juerZptoCjimOFbY1R9JSlV7hjZMle2L0Lhw0gCSjjcBpk6mgr+kpVX1w
ENQ9jKzOC6Z0vNgvpxODZaokVOOAhLCQnQu2jRjAld8PQUKxjclbVMo0OXGm
ViQpCDSdY46wjVWboP5oolkkLOGRylSMbMAebR3lg0pytnnaMYtYQkvtWKKA
9XHHIWF3N5amKq/YFp9xa0eydLgZB1k6Hz9y8RxsHo2wyO0eecXMVGRzHI9r
ixWcDni3rEIeACzFEQmRcn6eq5ZqK5DYmy/IzB1wk9BiAkFbinE58JtHpuIA
iYqzsniQBZLjeO4DprXkKd4hRl3Cm//s6se7+88G8r/J9Rv++/bFX3+8uH1x
jr/vXp9eXvo/DvSKu9dvfrw8D3+FX4Kv4cX1ufyYPk06Hx18dnX6y2eCBPjs
zc39xZvr08vPZHrj9G8qydmxCzxL2Gv1ARmNZPSORXM/P7v5f//X4y9pAf67
25dnz47hIOg/vj3+5kv6B9S24g6KfK3/RIj+gDQ1FhOWI8QL2ecN88ySzqGj
9lhwx1Sazn/6D5iZ/3iS/E/jyer4y/9ZP8ALdz60Oet8yHO2+cnGj2USt3y0
5TF+Njuf92a6O97TXzr/tnmPPsSuOZ1UAE7XIbWV6ie/IRVG5+pkV5yNvn15
ifLgqaoci1bSF69Or088OvbBdSBUmhvDVWjRsK0Gh767eH4tjYCLZoNnir6+
vLu/OkkuYWnewV8b3tPJSa4cSZ01fX11ebIRRMXH5GyjRGO/s82/x3UkRrM8
XdNFN2TPkQNFM0NfXtOTt7RfHia3lyc7wNP05d3Ls5Pd0Qtc8NMVqgLZIhr+
JCafvgN9+9P1y5M+bbe/DVbyfCv+YEtag9Z4Nb6+ovUldRFkelb4qJpENmPt
NkaucPIul+sAagga0mQ820jvF9lYQs3wglwvUvWO9dwSNsk0m7Ihxg5HCHfh
OvPGgQTwYdETOpXJ2TFQZyGDGgIZHGqClliOM6afzti+AOcSt08ObqYZDZF+
04ykWnUYZs3e8TLEPJtS7lU5pcGskdnmcIEN4ZD180Z0j2XKEY/+GQjmSGki
oaNhNtYL02zS+Nhbjj29xNaD3RGU4yByFMTU4ngB1iO4vHF4Uv0VILLII8iQ
6ZhxV1dDQzMKEuplwjyHyCrrIDg66MNoDdfJWsprlMA7tqyrWv9eZ05LdvM5
uMdbikYkJgHnLJGTace/eiW9XNNCTVnjscy3EPAkcxabIVseKWL1tTQsgyhG
jAPoYXGcdRXw6DULq7PlI9EBdYcEjNKZPFjlIUxXTC0KU+DVaMeL0RUyTic8
reaNrAfyLmqxRJU5pq1pK3xxwgl483k5qT/F3qofMdhDjj9LnMvF+BkEFVEN
/AA01gQBLD5VPg51lIipqhEucT66yS8YqJa8XVvE2XaT5YimUurIh4jjVD7Q
Fbnpy5SGTIYOCYa1fiRbTN7xS8GGDUODyQjdcW8mczTTWpONBc0ai47QHJLL
CcQZB/HEo5TTLxGj2gJEA3i+6pnH7kbtsyrAWzhxe9hd6roL4mWwNKNJ5wvo
I58lCZgS9isiF5WDB3w9mXUlWm3LBHwFPeFnKwtlq/wrj97xcSSJfbFrpZ62
q+VOX5+gOlSFJJsiLHjrBn2g1HdL68ghOxxb58JBcnbzo3o6ajnb1DKEDBLC
3H8JeKSVJTJ949Y6wLRgkjUdd4XzYoi8ZWgYFH+FDCKb+Lp7nmwLhItH5H0S
xLZN+iHUSTokZdqA8lFSgEVZDEnPkM0taTcNuJsaikFFIR4oqKcnyA7Qz08v
hl1S6z5QAGGvqaicKAZOT7H8yiptFihL1VbaoTmu5oVS9BuvI0RYhJ+plMvB
erBqBkYy0FhUu2LAQrPLz88rg4erQKt8doEehPdV/eLnLhnGMBOO2S0dunnr
ddLiu2ShTPMpUT3xITlJyAGTCp+QbhCvGftZAwI0zlzXc+ATCNCwODXztWCQ
1OeWhIl3vCKAo2zHGVALynAxMCSkSfxcsuZ49c50OKnsM1lZ9yeH1E1Nzphk
FT12inE+FRr+xbsVtFiaZuBQVBhhgHmogpPYNeYSpRYa4JVHH54dH4m6DBoD
yRAeH78fktjkwZXQLBwHxc3wwy+OOLQAic4qWLFbHWnMEjqO4eI+mn86PHt2
xKLVNIe6uBjXIIkALYHjaCtURnPTDzsipmKjCHr2wiOivBPFIDJmOPntN45J
YDIH4uyZrDfcleK/2M9LJjmDMml3ZRrP8idZcpTl0ptuIbb8E51D0QQDL38H
DCxw8kfeun/8/V/5MHcDxSF0ZNbQCdd9MMACm4Mu0JVn08wC7/6wxHeI4Hs4
bxbDkfRvyTaDZPo1iG9VvfNSLDr299XK8ebU4aMbD0LvqQEQW9rb7eKGlvr5
2mesFTNVvxN0xgdXyxQenn15FOUbHqBJgZ6WrYcdQ8sN5wbrxhYtFAA8CfKK
AtaG8WIAO0ANAHjEhl1k3IzC4eFAfdusJArLxmp34v2m48mxgJm3WAqBU9Ur
J41o2UZRgTBTEJtaI6YLYYoMOng6lmLc0MGmegSKAQ7mdeldvJC+OL0+5ZYl
nKG6P7t58uP5TQJ/rEauaAzLjOEHEUJIFd6KhhXNgCB347yAkMboQeZ72i0H
gT4mPo16Qvj4MYwIXfqsQ3e6zst0isQbyG1wzOjQIysCpor4sdh1JLTTFcnz
VMWP8+SKtLsgVH+6uQ7ugGYZhh6r46FsOePB5g7PZZJHzsz+k/dGIwTqCbD/
Vbvyua8IGufjknhDljlqiLa1jyS38q2Ze7KjmWZboPFi5FhiEFucLFpFcJuD
VJVlI3e1uUS2HKYa7QKaf9ZfbPE8stdZ88WZz13Z+D3UwxJBrZCEl+UULorl
hldpVnlkDgfdBdnSHwsCIfR6v7aAm+mUpBWrPnZC1ssVmYNIA0MF9e4LsIe5
x2Io2jeHZ1/RHLxsK849sDHEm0Bfh7ZPI7im6Ex713EaLZZlav/x9/8MP/Yf
f/9f2Aqxp/LhTOkEzsEGZ2LUQMhsTIjyk+PavzN7RmR1NkxIiecgUYqgA1A0
8kt2n9kpYs8Yvt52vvb+cSk5wQGcZ1Z3YPEjdKr4p13hpOTw4jkzY0AC09uR
3EnfsZSlz2l8M3Yfy356X0IqSQS1WycmOZUgvs6g2UgGoYSj9uC9JvL8RMiJ
cmkrwbjYmrIFsMjQ4lAUub/Tx4+3L8++++L4Kxx99iSjgZm758SKkfvW0Y0H
WmVgUh6y1m8KFl3eAt/ilYMnivYWv+K85PipBmNgxugSZjyTcWjIRJ8rHrKq
5B7LtRj0i1bzjZafaAt2DSNeEhhV5Mg8o/98cdTdEBd7NoSeeaD/FwIbC28G
+1zTkMHx7CTJbcTmG3emluWx5SB1sWirVNIjUuEHhpfU8AZi3HhhhV2n3sdd
Ico4TQ753JTFkVGM+bdkhbgN36w7+6frl8nhrujgEe4/CV2n7l6eKQ7jBD/s
uPR8JSvD1WJdc+irm+XbHsGsA7BDEHfBJ0GRm1SiSKZTIa6RQug+AHGKDQ+C
1//s6yPWN3cA0ZJ4NX48g+r4R9AHc0UkchaARe4YOYRV3+7zzz6JCPfshpgX
C38Cu9yuYhimvCu7ebyWZDFDhXdEYd1z0BizYjOiWmfGAp5RzjKDfeNBxjHo
vBbeU4I7IKeWIAAyfU02ZzV/KJN18Hnymo7iUJy8KITBwSuMS5oOSFD34+eL
PFyDBMBpZNNLwNQxAhoJKC37uOhQEQESj6q2XoTXLHYJUPdKoLpA6uUGqg7q
JyDK1aRc0tIhaGvBCHVjZ+JVw8jmGo1wX1ZcWoxkk1xnyzb3lb6IDjj7oFNs
ZgBXzig+LtY9SCDpRnw/59dditoO5QKS5OKcu8VBYVJxlABLwOVrXYc4ypJ2
UpIxjCQ4QOW4blJA9BmUUQGyhHCH1Y2FKViAfaJSP1LbgGnqlkEfTxCDLAeb
uA8GH8JIzeOokE1AJsUsgu8j17Iclxz0l/oFCf+g5qSXn2azBAuKODtu+dCz
XTVRzvPHmO8QABcAZy5jNxftgzdHFnAUpfcgwOWJ7kBRUx53iM0jlSrY0Q9u
kfEkdv0YH+RiMFk8m4wlF1kJYJkPzBuN7SBxrNx5tv0VIehjtQH4zSOzLfbC
xqwNWBZoMMmxDRenjKWqooNw4RZeHjpRKzLOpz++etVJcAcstzLcrxGVoIvY
yI2qbjxkgrbWo25fkQi0daq1IusFtjjzaI1Aqx9qRhLsP9kdWot4dRmban76
JacPD6YbJoCpBAACH8fKyxdN0X8dvWDAeSN0AEezFpCXVHrV9IhhIRlKf8QO
Dt4uMhxzcRtqB13/a6mpBy1U1ULLDXB6l2Za/GwGQgB0mNDndhYGZkjPKjEg
vKccgMZpLQUMVSFhUcxWo7UyHMO/sZ3Mk/IIfvlBAPXYfWi/YB/iLQd8U/JZ
NPKr9VlLwJwMyGHAIi1MmEKulispiJqprogHqqc/JBJJ8OWZq7SUiDYDhKUP
5NQLWw6NpiC2wnZl7LzrwxUSan4eFLzENrZWXwuEkzS5XMwqIPUgFDbvvNAc
hE2CS0JBkFVKRfFuK0GZdSPW0b24/k+T9wb9mHJ0f9JJelwwZLVtwHaT+yEM
mzRDZnFqZwvbJi/Ld7pAAByKM5DMIN43C5OTDkLiP/zHw89PL4JWhiFwx+FG
zdZ1dbYN2BUcgYqBqw8hDTJ2USlhXKmRyb6NAI0Sdl1BLNVio5BB7/89ktLj
2koKpqF0ykcSrdGgNfJgR0inlcYTyQhY9NAhmsZidVAi9WMiKtT69SwVnVj2
4DG1ZPyxTS+wWR8uV6TlNt5FLS3zKEdJPglYk92tQyjvIx864ooiBMVELHFb
ET4IS6GzTA4lvPNkvG6wa1sGqHv0z9Tl7LLQZjxK2IwQ+5RvkU4RUOBTykkA
+tFcVD15tzcWi8AUdUNPfDMIULK3uIAJ1bdOuIxHgimq6g1Mue2E1tsBcVBP
g4UkDIYL5IKLiaTgpe5pUqbkjg7nGuzr46Q/fmS2UPi1fpEFwi72zHR7xNob
BJa84Yz9crzxhNj4h8hi+VWlgq+GkF61fBZ0zORog+/4t98+fmTKXvzBZLIc
+zot4vLj4K2q2Naas3SiUru7AztYB6uo67lGfPo8gpP3qy+3aSLNgTJKqbFV
B6UuGZw7tFCnMlx7ZhvUnkuQJKAJjZvBj15pJeQfUgpmRk74FbZbOkbSt3tw
ui9rYUyV31EMsheBD5ZKVMTGR1rS5I3l7z2EHfrO8xMpgjePfqyQdbu/h+na
kBj8H88NKs3bUBGsZfTW/s8X382iK2jCGRcRXPRONXXgbnAWzZWyXj/nauuy
eA4upWivgpOHUsoTlaiJHa1soNgigA5WXHFlXLoMjTCAcGxlQV7FnoUMl/lX
IlgA3D2aG8FRwpSR805Gcj3ErzPsuUlSrwt6N/zFdyHtFFtxnScgfokX8q/e
CELTb1/J43MgdJFaNyCRl/jt2GN2OF+uto5NIjduXJWZGrNsjIZMJm0JemGU
qcFPFwKErUeW7NiFFF9KFWbv2Ja+DjPaZFtwVjPfZYLPpCI8PMb3seB0AnZ7
t6C7Bly3lgSgRaYlSVSaHx6liLiWJOdpYeiVHlC6YssRlcwUy7rD+Iwc+VIP
2jsR7wY6wilSp7OMXpPRF7St4mIG2CKwZ4IpQr8EDOSIQ1WhaqBjfxkBiadt
CUU6h7VbZsOjgKaPcNoiPTlUps6dKLZu9WDkBayLyaIqpSpNAp1RuT8SzIAC
NJVmqUpy00agrNcoCVsStYDDHk2MkKO/xInQEF2E8NDafI/zCJiO5DRHJFjy
fSLdxPzvltJ74DadW5dbHSZvI1oZ95By/inILR82KBnvJBnFNGe/FTCgtF6M
S67njQoqo7xl7H2rqajl0LFbbvbORuU/NFOVzeeuiiuUu8lavyq9GijUfeYY
ZOVA0iCnU0OFNPPYwPFoDLTBIVkEMrjyz47blN5w5jMhVuyng1l2/PJIq/VK
A8W39hvGz7AX3fCxFsa0BumYdkAyvi771B+jPzQQxM4Wnxx+RxowaT4WCauW
fUePGVPpNInLk8dyONlsGMf1f/hUQIBDH1yR+kLvqU8FKqb7SPnb5F90ht8U
sdiU+IQ/mzFplX9DejF54mMqhXMz53LklzIfakWWiUOgNkLfh3dDBGptJNuE
9HLkfkALLiV8L3tSQY5aVYEuMnCO+YMFiqQVVsEPE4iQZzuysIYnPqw9r0K9
LGn/5WtOuHC8Ll1GKylsOTzpu8L2VgzJUlioJIw+ixO4Fr7V17BbA5++4viu
FUj1MlHaWTSkIsx2AJKkoIVm+V+2tsHsY4kp2KjGjonGLDnasLx+LgEhI/li
Jnq2TGWOrchjhp9wAi/45V7/wGEQ83VuZ3yOKCvsGeRLZl60cNkGR9HlFex9
eLx8z80cLA0ztjvTueSpOnP18uxMUqfgxHSJ0HaVAR0dpCbng32G2u7x4rvj
Y4kAZnLc2yZlPjC5f+UkkbVqxyQmO7Xj/DqcRQdjFn2WPpBytLVj8DMjjXwM
DzGCEE9m90oS4/5a/3AmDME8SMAmhvnamsLP9kWAm9lrbyXZaeJcta41Ww3x
jkIDBo0L6nX5MjaDY76cU6kgqp3fu7IBI8YwOfAqmHxPXA5GRxf5mJMkDUSB
bjMzOncSY+PzLT7/dkB8HC75jX74OWJrDFRiuI7wH61WAOofXGgZI4AoM/eY
rF1aMc+lRT0ZnOXtkKD7uoPZxBtaQTe71rTUeNdZm4viT5N5VT5ygEGQTd17
x5j/8KkybcXQ8S3v//HjVVuDfGhAf3InCnjfdxHYirfHpouNgGTEZwVRgDgJ
l7yzsy5JXsAm0TYxungQMOtriRXR/ZxSKoiW37y5gDDoOkwMh1gqmyb8i9NE
APhY3pkZ/8GW5Qu0lBYIfXK11nnLDJZVQDGGrzVGwzE8KOxBd2F7Q936BJSL
1jHBAdvQWhZNx5lMdGTjBUhMT+KkM/7g5EwtnzFeEHKoPtKkIR3bHc+JAAjx
g1JDVripoOPwURehJbwhplGORh2HkgWeemNMLTEsZ7Pa14b6DHtsp7F1Y9kO
VpxWPKuTICDzreON6+L8JQbBG3TQoKH+dBDbcoiAvmEyq9x4D1KuhwuGDAPX
1c6PmY+jcyLmd0eKSnU+Cwfd0fZaXeSifCevOrD30xo1j7yVSDSUhMIfop/a
bWl0hx7EfBRN8Sh5xfk8ziaRZIZbGTFEiuh7lHClZGY6u1bxg5yOrsyvph3/
wGQ2aQ0o9+ckFu/a8dBPGsqVMjGjOk2TZCQXeNuDg/OtMmrL9AaaU63V3zib
UTlHL9hk9ZBDM7U7zK8sapUxa8lhVRZsOF64iQ9FdXxbRSALSx9JEO/DaVUP
7hkSqvHB7N7H6MhwThl8aSxwPBJG5YhJkGtwm4yuUkNgXvmEiyVQU8zo2BbB
ue2qljjERWKIyRMCb+0m2oc0ZpNb7EUEwWQbI3j0CD2adz+B2KdybgNPb6UG
jH/gavoINOntDhb9Gcef+2QGWykf+oQHvAo8m1A4sIswR37Ahj9izppatvXG
PhBuEYVmSTKEQbwSBVfSLqaoRA4UkbewMbvjSZDyzxCh9Ex4n6QIamXjjGoE
JOPOBeNN57Z810MxC3yq+EiE7lCKFVe+WLEGcdwNyNVCDCQaEYnHlm867Wof
ZQ5ZipnJoABhktKlAKIk4v4JM4jELJ9AdkFVH5Cjx8Bu+HiWWmDpbAS5PIHd
dT08u76uj6LxgoGRjviWSaeLb3Fxx61HeajK15SxhvQY3aIbv27QRZsBPZU+
kmselAqFSwcye0lObMRHHVuX5AjNmMW1ttWz0lNe8QtNxEosq1XJ6A4jbs7M
qJ7j18OwMEEWsQJR+lhdw61ylOZBzIkyZD46Lq2melCjxMDBbmm/BI2YriJn
N4lRukDQeYZksPCZ2A86RFXMzvMwkj7YShBvFCtBPEg+XOCOBs8pVwshF+To
idZ2WvQ9nKdYC3bUgjdFtEok8L3yvYTnq2TZGA/VppAHwWxP2I78gtHG8jev
HTdBcD07MAZwC9cXuC6XGuHQEWisFgj/Yt4sahMxxlkQ8LvsfYgIW/V9Ex+M
3bYw6vh0ZROzBamtXvT4+QEjFmYcbp0sae2AZsZPvdk0tjgUe6CYKr6tq+It
xMKMjQktjoipU3tD9bBIOFL5Os47sxeklX97fCA1s/6MwXKuVuUbNswODtTa
tVxbx0rMIpj5julmzzmZsxXUGZRR2cZm7tar2VpIFdUXKthszLom2MiIFBW2
aziayOFgXybTfdYhTNzcmdnPun6gVr5qbL1LxZLPF8fWzlvlmsuiXQsOOkxD
NBwP1EHgU3jGQkRoQ7Yw3VA0n+zktiuOYGyd2t75zmYQRtErCfEcIwWm3q/q
GFshLaD5nYmyZKYeuWmUWTIVhXEwxpiGmAs1rHuYh5aBDhezfuGLDonDaDk3
wGM/S/SqZ4ThklXyxU/H0+Onv/12xCNC7hfGYnhRXdtBPLDe8wxR0R/Zaa6t
0x642jbGZ2yafV4DQGzlLXpv6XZVY5R5xVUG8gL2o/uqr6L8by/HbRIXG0Jh
bsHD4ov8KVdoZyigAr6k5umbs4wfcYjG8vJ6hmsXGbbRy0oNfvz2MmO76Gg7
UpWzg6m6obGp4MuTYmCBMgmp7y1arOotWB0oQ0UrfqKml0GIScjQZdvLwOSb
/xehwANaE8xsCZqATVt/oZafjnpkFmEO5qxLA3gSRROOSfn8sbXIISdKZLdE
yH/VSC622WLD1OWzUIC0+eajpLfCbOAPZ2jwtotGWC5RqidPIBZWU4/mFcD+
yRlpxjK5x/3uBMh7eHV2f3d0pJKZV55kb1l31MAfvPS4DSSSsOAjWmEV1/HV
Wn7QZyP8w1flND7Xv/NUdl09Y4za9qDIypTN1xhr7dbtN9rQkwEdHivdgQWC
6a256mlDDXidb1JGN1NkaHq90FMH/aIvBoOF9TCFGZWm85380VloxKUMtYrK
IKGBkz8UAwPMl8DT7ZX57JzCX+XSOWGo2mauBk/dG6SBuSoE5kON/5awie7b
iAb2f0xuLwdiqerf//j7vx6ZjWCJUQ9Rvzr9pUuR1bE1zYAwy0QNCagC2/7M
MMGtaViFb9Pc242xe8Y92tLR5d4o0w0lgSQLxX/8vLEfnF6AvoZZ6tUwtbsA
Y9tzaTq7kZG3LoSFZKsxClEFUBRqS2MjkTdPJrysmAIO3vkq13Tb2uik9awW
e77u8g6v+jRWTiHwUvogVNKuJuUyFou+uvVNFW65ddOy28G4cJHZoc4ldFE3
xTGJm8MeqhoZBB3iSdg80If3qx40ZiH2luMM1NQ14JD2pvvZ3o824L2eZjuG
maLOrNOirNY3ZBOU/E2ejN6m9DcQlSg/rTIuLs0ivnJpAdS/PzNItlx3xoX6
2I62edPe5pW9smdXHBx0tsUORHNng8QRuGDP5ExhNYj5x+OpxnXlkyoT+vrw
+d1Pt4POzUmn1BsxNr8kzgRpNDRtC6Th+yp9HKfGohkux/fQOQpb7s0pGv2o
IImWKVSIC9bYQ0nUkleXUqIkIW+Iw2jRV7NwPJA99oS4vId1ef/+PhgbfAZj
U+gWqnmOBYSD0PkmD5kVLRs2V4RdgR5bJvNpa1YrFUA+C13m7Fb0TX/7qTnd
tExgEdMPs5FgXfcGwK+FEhYRzkKRJbhxm+/9h8nbAcjds9stkNWYCsmrJmQp
N4cVOtXoVNRGuJ2xpSxVNVmtjJh2XjsqZO8gR9pDriPj6fUhb9ixpj2g4odF
OjOsbcjXw54M7hrlRwMxSLdI5p7rFD5mM3qXiEs1FDuuUMTPlypVuOV4Zcix
CNsUYDsloIqlXlyl7AQBN8URE2QjgMPxIGBApHyELfU4OGRmRAgRKU2pWRZG
lCbCP8oQxjjILWEiYOgFd1mkDwaE6d2iG0jflqTTlm5I4UeFUhJsl3oDyQaQ
9JUsl8WhBDjKRGjucZD0CyWEktb6IHiKaMY/9cl0ZkYlre6cr+CAdZIVCxm9
VRXWJ8nh8ZEHOsmRjbsdsW3dJQpNfVUy2x5AvwWM3j8nh8+OoJiF7Ic7ltKx
/WdegMMv/FeCtXmC+rtS8yhGgR3Pl77rPyuZk1UrbLaPs148uLUWWm6MHcON
SqcihdZtNwKlcX017LMT9Uwp8I376oktnKlHWsOFDirRXGwblKdliiyEwHOj
FU+dBoee6vhwybyTibD+riSYZjyDdls+vbWw1nY6ppj7KkHlMMJajVmktUoA
8kLow4MRrj3MhHShezIjUQvglYCp6yeFm6chtez9ozF3tLV5i7PdipX3TX4D
iLmHWZVCJIzP72J9BvdmlP0gbHZuGsoCZadJuld0GZoeDsJ8YHd2GRd6YCAb
NUedOuoBKr2OuHlkassxH0zv6AVu9x7nPO18rpSw5IOsgJ9pbno/jQrjjMfH
D2DQ/YmEN4QKPJQda3V8kQuHABeCqwyZ0VhgPknbq8O4HI6v2K5OjqSXFK1p
I6anx66kuq08vU0acz6Y+Og8J5SRjZnkgyypWujNNqKCR5o+irQH7YbhjDQv
kmFchdw/ZrrkusenHqLsMyk2dZ2wvuz6Q27WkClKWHyTPK4ZtBYpS5dE5FLG
KTS2PmTcGi3l3N0hZ/NQlPA+W7ZLLzMGhnGUKPevrBfaqK0kE/8hMsxs8hI1
YyYsnm+hT1Nuw1DqDmUuNXgMgWH+MHtfeVlxuMV1aqS9ZgC+RJw1nJtdATSs
JGNxBwnhd7IqAQWAsbWrsxKxq0zIaEECCJC62uufVCr4EYlNFSCUHKYMehdA
uljMzN9tCyfjBdJWlkEwNiGCEWr/ueBGYfJ6GmIt28niYnVDxCXqYlRqvZvl
ISS932m/Gu27QGW/7WbohrSxEYXrzBdvGOSdkZ3Yd17nXJ2+4H4Mt0dXdy9U
lMbu04DcwCLjksn3AjYhj3slrxa3e4DjNc20DRLHydWyy9NCQMp3P11ZvV5I
5jMVHTL9c3bnq6hgQ6R0PFi1JCJDod8iJO2OKVKFs41QdegOYp1ex46n1hKc
TBxINi7deuG8pWSHzYAXvOc9KIwfYRlDo/NYZu85DSHfGTEDd8sNZSKpER6C
HTRToJnNtkz/RnOaC/54WjplY0AzWWm+HMqJA6wtGkVyyiN8zr3U+M8zkBto
L1phekutWW7Rqe/pWZmkFO1e7PmzjApkGz5ToBxU1vtHs1p+edQCZ5NMirYq
LTTLhH3HHhInJHTkUdF+pNol7tt0rV6JRqIPhjhenn7fFHUVd2/NjGa/78fp
aJkXkS3GgdDzjNWElFhArKz80gqqAUGozgJzAbzZrmZDKZabE1Mszslase0o
/j8vuKET/Xkhmd0D5UWFPanuoRpgIy4BLa3OZALCeq9LmYpBMlS6kIIv56Ob
LRNBmHhgmV07dSSzprWixqzQg2c/tcijMcdgRxg9LnLlmmFqNjn0i6ngEMZr
i3xPUtIgQjjte65xzYdDxfWTVYnmaVyq1MEl9V6Jl4Rnr9I6bU/fcwgJLH1G
6vVSZNBRQvLyCSQlGA3JCjNTVcEjYq3qDsN+lOTwhAu619zfg/0fWhVlmgt0
kChUdj4lfSgRmrohhQRoJ5KJQ88GNFxFTZQ1VC9Y//jFvGAI7MzrTr0V58wl
+i4OlQdFhWDPEz/Ryue5JG1ljpE60bLmIu1EOynOPh5mcih7B6DmLK+jvs/G
sHakpYC6BEZA0b0JiKWZBqLpUC8dcQBJtjI3iWCcLJub4pH6niSgRG6N127j
/qCTEePpEBhVmS0A1DqdVHlbSc0B5quTqrFyCst5x4fEd65ptJYWGW+d30FH
tjULT/sItkI3V7ZC4fbQsiBtKZ0pGx8MqSgYKzi3HnOS5N0fpHQ6HpraIEJ0
b2dAvMYKgw4i5QlTi5qQ9KkFz3YJdn2m8Wyk+9dhlP3nWAVdo8foSFtHomFO
qo2Sow28WkCIS11PLeKD5VjuOZ7xA/Rm1B5QOg+wjAM/CAzGYVMOSYAcBaRR
JknYq0sxURU/vExXvhuOZWTwukM5/55kIZCIhCAGDnq2krIgkFF9fN2mumom
ZAUYIdDFbX1nxYDWRjtPpHWqmHHceh22MOxdrkSxAnqx3uF+Lnl/K/aZ4y/O
Ytb82kPN9tTayAfx7sIrecuswty3ehZfD+jlZFB94mutROAJ9cZMqDLI2niC
1lUhnB2W2U+YepBR8WZhLaosraPrq2rxiWDXme8gFJuyNeJfHrzhWVoPtC0v
TEII1KSme7Afj/sbsjduRcjmrKSRn7TW4iDiWQiUf76UQOuMaOhPwukSqJcC
g6DAHhAkluFxqpWlFxgIoRkmzl9UY/EVgVE34oRMcBLGeeei5+na1fRqWiD0
eXIJl+bRsWNzenFwcL0ZUgwVkAo9bFzR4czzfHBSHIU1nzQbBaXaVBa9prF0
FXdV2CBi7J8K30rdYBHK2xVg0pel8nzSoYlqzo1OOa1D9kwpdDts5R5yaWRn
KidQwcYqZGUgC7HGI8ILYSQRO0sxYmGauFzPz4yU9QJrFMcbJJAJIw70XW4a
kX2D8h15PCEGsvFqYyhOnwrbZ8jXdJBdKNXOfV23mYzawVmvE2BF6ouMJ2W7
yi38sw1uA0dVWr0Zt+QMNLxisfsCeetd1cM5gn0OfCTTUB0eBeS7vcWZEdnO
ljzSAngcxIrY9ZqyO5Jttz4TopqQB+Y7BlFkdXX8Hqz1nGaCndZViTNnoXMf
u/OFynwi54Ikp2uUXwtprlY5IWsaGBveBwe30n3XE9RFk7fSLjwmQLnjm2g1
356H0YGmLHVyREwOxVtmlT1KbtAj6nlZH6MnFLeUCx0gQ7tQzrPJXUKRHLlA
7pGWTBhgztMGJXESEdGuCt36ubOFY02FZwrJeWFmuDdUBWJo44ZSBf6PxKFO
TGiKJ15ckAq9qgKlErm9uk8Ob53NPB+BK9at9/j7SF/+Cxq4xKWymMZeqiW9
CDO7QhVRBztutgD2AXaJtnjmYXdLExAS5x7QMkoTRsrwZbND5syKM7FMPcjc
fjFK/F7fTWPiOXcOrfx7sq2F1xwq+43E1a1dQMS/PFa+IikAP6QVrVijI0K4
IHuK+Y9UtgxImZer0QiAhtNJP5yt+GOLLKXSiNLEntQU6o0YXBmTQGsBfqcb
nm7mmNUe5vG8RfLjhAwx7ZGJngu19JT5x9//lWdGA382FLlRh6QNzVzbeZ+N
R8heNFvQFdIc+vBSVHzwFKG6R7OV11p7nS0Rd2WSEk8kFsXfBXcZ8ZtF0QSv
4RGhfgDLoVSXikjMPAtpgNH4runqPqk1Ywenx+wVvdNhtJ8YHEHbN9UyxjMF
h3BGlRQ53wmZaZk7q/dOkwfl0tVtrvioTJ0hC3rjSHgvsSkbpZTwfbphSm3p
5CwROzYDhkryycnxpT9udSfF4PeLHFb33k1AMdFb4uc3L8m+cdU7l9OKaWeS
lxmQvhAGV5PJdxAG/mbq1TIDM4rTI8Ox8ETzUQ+YInnz0x0Lu5TFYaBlFSAV
VjRMti+O1+Fm1kM8JjqRgXAqHGF5kQlGhR9xASDIK8TLWp3KFruJonj2UgvC
MYanLeC4KP8f46FZqIgjvWIi8loo4UPuUPMa2p8jYqA2uyHeUVH5+9Br98CR
GO/lCG3umfbMYFEuTFFDGig1sRtOvDaB5ouisnuziWzzBnNpEPkHJOp4K9Cf
kCWnvm94FshvO915xCYKxkegE/JctvxWUhsU0bT2g8pxg7DYYZEycljlFl6v
acv5ehWdBl9sznieodoTvrzbu9CR/v/48TJrj78GVdsvaSHV7IGOKnR0CrTM
pxfDYHkgGKFdvHFzRoLym85worlvpIWowytw8FbMLDIwhmxVsmELYF5ya1jL
QAMsjAYxqRrDvuHfivJiYJWv9wlsyD5KCyYTL0E94YznaphEtdbSA4tM6gxY
4LDA/Vo4IH6KEMLERKYyf94Yjyluuh2ifHuUAJngkJhdr8EAK2PQsg0OdWyU
jhsz38j2IBITsC5kFvwPvIep9V0DMfHNdA3OcI5/+k4WrJX9zvr48VW74tc8
YJfwPHpFevzHz6MPGHjau8DCyDFiT9MwcnoULKamkZL8xP20pBVRF1+wjb9K
Hbl11LiMXIaeHpCDExnXUuDohGR8s11ncvjy8mjQM+3ZV4A1z3Yo6zVmbvWU
sWPfXM4oCmHscp9puQ7yW7Lfhi9JA8vTPC/HyEzhmZ0uNmkHjOr/xT7EDAB4
g/z1W5IVwYEV4N80NftWEjrRtRGbVai3iPsZe8hHRI9Mm3ZWzvvD0KxQPOgd
y+gJlLeVvqdFiG3a0dccXjzy0JLRnt9YGz0DWUZ+g69VZxCeJ9Ywq8JjcHbN
jdY66O5Wvt+4g09Ez6qY9Q5Doh3SpsMAFo52Dxql4O0uWjuCJHA1PiDfCibf
Eqnh2IKvMp/2zzFN31VavIQRu/dA0/HNBI/m3vt2W3Hg395s861sB1jCE4E0
oXnyNkrdyetb5ypfcNdv7qx96+WAMTa/S8jXubPZAJ40NjisIgtnklHx4LRO
Bs9u6bnGfOJjSg9Jmy0xFpjfahGvGPpntl5I/O3YXqPEYvFy/gBgEsjm7uOq
w0xj0K8vhtWkGDfamHrPVqk0xmtFGsR9FTi6zclahAc8oZ/2Hul3KNsmZl9e
DlSodcVnkIGaBk97Ii+KPM3I9dL3sQUgz+BdrcAeu6wpSzFV/dqKxR0/XfAZ
Cs3ljAo5bcKMFqUwGTrFCPVoSN7eslhhsDtp1jpoig0oVHdBcm41NAh4kbGz
mj7OHaWkjhon6ZUuPCiWMHWART1GbEpFOdWqe+8eWGd4uMn+ZMJOs0YRvjCB
JuvRBbBb56XOEPxTS4a1SOg7GsuxbfhZNjotLNMTOh15Koo8ovPW7EKA0GnM
SNmapxFpVgWLDvaX8MpOO/JIl7+sQnuBcLzCoE1Lq2rEbg7AIf4UasTlM5PH
u09vPdh4O6llEp3B98Lk090eAvo4Yivb7F7IKflV+qA+9mOqHV/VdI6qWbuu
f+dEw6EfblmkgHEc8jUbo+cibKAlaD0Agx4lomV6qmE7NZBUcmx57AZxpp6a
7i4ZxFTubPErb+oWbSUMFeJ3P5AYn/qmX0uW47sB3qrPPd2EzYePSXqSBMHP
aPZUt6TU7U69GkHI0RID2h6n917eNrfwChOKD3NLV0CsBAdCz08dcTUoywl2
tRmhR1K4pWWC1mWie5I7UhootzSfWJcX6cQqQIvIbg3h84gUkHsHVlbAp+gm
w7jvD5lzIIs9UviAnWRGWnuuZR8y3MSf6bMHPbdHfPJAgycA5Wbhw4/SHzWL
Uj4fP35f1s+ewYcjnaOu76C3AT01ysbeCaXMvlSRuz4j4h5g+CyUezEPj8Zj
DQUB42OMsegC3/vimfC9i33ctbn3N9noG9G8wzf7p5oVFsGc5eV1r/epUQah
R6/iYCIBogEXjkxKmkLTsz6+F8udWc8fiDkIgzXVAUtaHoqBDIFEeaswoLMz
6Qp5K+OIU/zYNNnKSd6xW4YkBa/c1VEQCn4znl4wea01eInFrFRhdARj5vv9
bIgdnhmOEZoHWE/IWlQuWQs2eCLV7u+8zvIqUdu3T+ecPjUC6NjVligmYugG
yJCokydYXJsnGgW8vJLiCEKndb02iWMTI2NXqJi21qzaoLoS7qq39xUO8afe
tAkhkPQA6NZCKOl5PyJCD8/pFAl9UBOaqKstF8DG3QbGuZPFjhRyTMembA1R
Jjb8lLMb3BVOKJ40uc/dmn0xRNBf5oIEL0bp2QVlAp7+5iSRpoUbdPi++zrw
HVvyw57fGGpA7VytepO0hOK/IRynrRLt6L6ygXnKfRsNKv2QVfJ8Pu1YcdMR
8zweZvzF0sMmmJiZRkEMSMkpE+9PAEHpq2/D2gkgX9bgaJS84W20a1L1JTRA
GKN8s6VUT0lTR9/OM9BQ+3X0Jc++AImDRNzQHvTVO1a/1gwQJ/8lkBgPQDEA
zLA5tW5itq7BoifbbyUJa9mouRaWyWFhNWbw59qgGWpuebKG0MBSK5EsbbtN
G1ROG2uE1qpbbhQiPYpmZrJSkQqCQo0jO3QKIO9DV1VUrjEhl4j5KD4SEfp2
7JEbbhHebbhYFBrA0h6Dna6CHksGyJ7bpjsO46IPQB4NB9gZLntbvmFF6Nqe
HHrYIamNhvabswrexrMJqe0RNSBclE29KhuF+3uWY98lfp0cjtdWRxEYnVHf
Qm8ojdIt+YjbVkDuyGqYwuGLgNORo2GwLunAHKr7VUGuxtdXVpPC09vdOtJS
WszFOq7yliXfgkERv67W9qorbiobX+uvy3SlIlNJrUqfX+BUMdtNypKnUq7D
/+Ep/RX+w7ZiufLdbOJT7Vte4sE+XGN5FFFuYTxiuobng4FuYwSyZ+irtgqE
1RWLhoX2nQGMRg6zH6vIaT3GQYJKKmIU6T1NBkrdSwh1aL+WbuM7y2TETey4
NJb7LXPCle+lFXads81cpYkQCXfadV3fDJE7RvPYuAth1HRRaJ7ytT+evrNT
4NYQyt1QibJgqq2m02iE9AcvPQwMa9gr58laukR1RCxCYfCKssP8sI0stWG6
oUmkVdLglqsWtncxdkvgPbMPrg4ymONpoXOGTRIrKnVldIOzhiGnPXLRmaEf
zwJzo+3yzGMYhQRHeOAPN5jUpbmzE+C5tMPaLiGPjDKfnbROnf4fd022Pi1b
uyQD2N2drTveWFKZT+JLoceMwEWOJA+SXdv1shex0UBZV9I/dMug/XrbHu6Y
OYw/tktZ+UpDP67L5de02NPms7n1HPe80A6ReIpfWS8L2AkS1BtH2WeNsPyN
uf+YUzQZw0JCjjvnuHxyF86E9DaXYzDhBvDx9mcktKh96UauQBQseDcDGdky
zIVodvOeCu57QwkYavWwy6mcegZDqzsuuMjrsdNMVSiNvfXKtems7TSsxKwI
0XoJMsw3nu8V2wdBoN274m5JKgFY1+ySAUyTgxIqQ3qkPqvLovFIeoJuObOR
0ZIWSvDkcYAeRR57aVu9Z/h0vdDXdgPKipDAORNKva1FN7f71GBWvy7Mk9q+
MJUtyLqoyxltmAtr2QV+Hys3vlPJH9G7MUHZimPKhTZ8aYRprCZ5zW69Xjro
jwTZcU/u7O9X+ozklOvHuRRF+LksZIF7KytQNJ9InA007+8x9oDnRDHsiInB
3y3GoUuDB8PQchDVZ6XZghZhVLYAtS3K0pN3TzNDEkoQyfO3dSQ8R8bYCSa/
hjZd5QOlW1TyjtAKb6N9+y9uJ9C92LrNTSKTsSe/BsrZXErWRQDo4smBLU2o
I6bcRZnDD/hjKI012JSiI88WcjxxIoG7fUpzUoavSoSXshxYEJ54X0fhqd6Z
FIBPuzjSO/bywN/QPzQ0aEi0kXBgPWH5zFXCmfaOkcoqgZxyDyZuAk/3tegr
/46TMqmApF6V1idSOZPFXZQmX8y3IpwssRwTqYTelxoYRCBHiOtVgUZdY9B0
Hk+BKtMGxFLcKCUv2gpYtYTQOXVDMwKZzqcydYhynC4tHonm3NU7AdNoAxBb
FTwzsiaAHNGSUc8w3Js2CXv4Jq4Q6pLtHnjjAKJf9iML//C7Rjve8ERYPbFG
bqJz2QWO1d5OkGQBrPNWGmyzreQVpgK3dkjQWurVlEneEI2Ihz+QqFfy9yLM
SifgFUhvt5G+RWFEJgGwlfln0t7RjhpY5q0bztHSKS6k6er6LftYjGuLrfWO
czca2wGQKYU513qo8R2dpxCN4RSzQbKlHx40qOHfPMMQghzSQDQgeqT3wtZ0
C0cRTvO6lKSxUjCEKHq3nlzfdMv7ZXUXvMtRWftkyaV+njtos0hajBkPCY4c
/9BNF2wGkhyVHWmmmRBVZI3PGEYwNuGDrPggs8TAaWaYX1jQ7Q/zZh8f+UEP
OM3Cmb92yj5sFOUCT4B9GDo6lOiHZCaMblwU+9TsmnseCHa8Ga6XbxookZ8q
cOglAmt0/laGoBY3g+NJtHk1KaQzJW1D2CBoC7BJTcKeqbvYidAUxoxB7KIh
U26E0GugaWCdnoNwPVrOqMmCAaXQV2QuM83XrqM3Yp9bW3czsZs4AKFOQ8si
Gf4q4wUYvabXGpfvO4VTHT5xKWUPTae5lLrTt1kxpuoehwWnvci0iSvrHZ4x
M60lyDiaY/8aaM+fkIT1sLK4FW2XrGiazTMsdPOYcTvfi+H5KKua2bBYVnNL
zQ71qiGuGuLWv/1m7KNLKQFLySeCzJ5YYt6n9uVtVEYL20TdeWwEDuAyckjr
XPDKcQNID1bZ4EP2iLltrS+YtKK0LOBSSkEBfLWzZgQI6Qoj4iAFF0pqll5P
wDjXGLCtzdSrnYK5W6pQlrFlPxgNgq8akcS7crl7UEwp/gQn332hk/RTDi0B
UwFB55jvICSmsHGlq59Y58BdedRVtw8olEC3EehH6/v5mwZru9l2BRe/c1Fb
bKl0vF90WKjUVWbmcfrn1eUmcRT39cP414lvTG7QFLsTtokw/ChrPIbvDW6/
zJ6uzsOtd7acQc97WtAqqP4uNBBfs6H7yJRWGk4jW8iCvXD3tHU8+AAiUEPo
I0avJPwpXCEubqv2phNhKaWGsQfiATbCIVA7H58S4mEPYw81NWYCNUKGki2l
MFFjJALFRwQqxm0wcqQeSNO4VKXRJC3s4AFDJz1tLEZuiTsT0vGgtWTrHtmM
jmEWCXjz6B4EQ6dwBlilWCLO80YkOUIjrYTqRlUy8Iw5olVmKZOZd1Br0FTg
rvKd71qRdhqsI+eESdF8+T2ZoRy8gWnYale+TsMAbXwcm4UcKEVUgl3Mbi+7
ApWfdTvWQ6dcdufMlcLWph6A66ug6snQMfN1Kw/tBoROqnIiKWHtHTK1hmba
m0JGL4IN2StZOpHUTA3SBZpFjFskX1otbmFDRpWxtojOdUGxFrYzPfeHjisg
U/hHqM02V+hwS3ceRP/Z4IAEp9mBp2ZMZJ7LDhnoRnnEGEvEgZ8emDWd6IBY
IHmbC9GeUqlRdKG5dS/8LSkAimFJIfhcTL26TH0FfCAl2uDbj6QoW8KSf/J8
/5JNiNbFY3Mqp65WCJppSz17W4trPTjQkUT43zRqJlWXodOxp0aRBGcxKacx
glDuEx7cA3l5RqMa8qtBLcS9p9bSTUhGzbpRk9vKjtJa7xwzrcY3rBnawZUT
SOxEeJdOSRbXRohHpwMIVLEhs0VWZZVJ8NZ0n9YH9kT+IS3Y6mirUaC1H935
5Zc6hH4/UghjpO3UuYftwklrTyklc/AEs5IwfKUeBMynpFuVB2rcWvKH7yCc
WB4IDd091+5khxc3HkJRgyiY9qiOSO/FkEpGv0hBv540LpkDpsn7jlxTma+9
SyGhlH7phwJryA0YLjgPMJGoK8IfcOFScrOGcyVni03Xko3Gu0l5fNyp2xGb
RczP6fY+mpsNKllxjTeeEENtPa4iZg9ZiWjRMX/8eJsVx9+gnujFQ4VCXxpg
mT97igGe6zkEVUfuqec0l7OgXSdU/V2sJdJ7evhkG456UBiFDnSja0y6G4gQ
41BtwzrR+9LCq9YWUR8pPLIVpga0hzn0wCbPQ8GRPR+Okn9zckaZMjxV1zJ+
dgf4HneAfcmhROQmRPkOIgrb8CJqE0eu6rjN8kZ3lWfhv35xmxxep2ASeCE2
HCqf5+J1HMXbob89cRKuL2+incRxx7vXp5eXrNS8SzmpUF3ACEeloGMvYQfa
7FAmnaRBWpDJJQlUJjYJhRxly6JKPMxeKyFvA4eh81CvbAngoKQVvQOSgOKT
QrHdMwdA6PQbF9cpJRSTuFiKyPOrqd0Ux5j8SNWbnoawTI9cnpNUgEgOgoks
ZCty13JiaWMSokA6yiOjJhMqdz0k6r4nhP3eVQiJ2HwqQ3lUvmuemZ6gXoK9
k0qhL1nNHEBMDmnemgVZ+++41pYecTToeM+aREA9qXUPTFfhZMVoOk97Ecof
vWLvTDEPUUY20v7g+sj4zZ5ncxYYHoIXAvlgQtLX5ZwSv67MEwKt3qLsUPzB
XEN1XGaILoSkd7Q45NR1XZcTNtRirnsL9aiyx9h1XVm4lkV36cTxNB7J7kwy
L89ErHbhg0k2GgJ6cyKeGbRPZ/a4PjrRG4EcGPA5q4btuywmQumWnYYXE9Pi
H3//z7M8rRd0zsvHKVLassW8uOyNoE8M719DDRVfZhVtFTk9ysfZjT4FAKOG
gzRuEfM8xLmmbWFf2Q19htsQ11JW6KrMh0IgkDLLxyOjSD9+vEor6fI8Xvcy
OH6OaWBiUdfBxvOUkDG9Q9i3WoOjiGQRL0w8w7UgPIzaVxPIzdXqnzi8hKe9
9ZIq+NMhMmo1hFbmZiIw0AnFGeYqnu/MXPnQDRudLfvgc6XzrxIJX/IstRrb
YWet0WSb8VQJ69dDqOlS/Kyn0+Ml7mTExJcTm0G9Kfr04OBNMXGWxVZ+WCk/
3+GhLVz0czvgI/QusuLqGaIWUY9UNpAsOz8NzCfcvNxL/Yublxc/w955efbN
UxhgEmDvdP9mqXF3fq32S1TQHSLPHz/+0oJ25ePH63krdpJXv/NSPGkJi/C9
FegXdU/aonC9SyIYb3jiIB18UG4NYX1TbWUyMlIwHINvJSfSLWCItZBNhJnC
MJa7BN5JJ65gRlSnmTu3YS4lJqswKQRZ7Yz5jkyjLhKp1/Wj45T2tFd4daE7
RBJSo2dRFCkkuV/ETABbeGATaRzLCat8hbtBy/tO0IIfc2m9DjojVCBrRI1k
5ZD7sHVLSFWKg3zHIpAhJ4/iysKhWCnaupFFFJmFYL9+kNi9AdQ3Y89gTYt+
HtmuAefGb1Slj0YTqhQ+z6sMlr06KAFXbq+lATdWHkPWEOIavM6q46/0oMQI
vTDfiC5bFoprQpYOWkjxVuqriCSX3NE66qtH7+qcd+VcfaLaaUjW6ZylRTqf
g0UgaiYLomz7nuRj53o1BSrDSvUIgxmrE9PVisyMOJ0txCYtoIxxmMun/EDY
R+Dp0qinQClPouM8HHhVJdDawPHFFzN2S9DO1hLBU/IKtEwhnaIxfAGiNBMc
e08+q7TCNu5bqd1DMTdLacXEVb7Ot+HwkKwuPXrPKDacrWgX3IZp5DOBr8PR
OdRSEUZJGjrVJLcEuthg69TwBnptvFrUT1611Sh567RinJ2jNqPthMrpZfqr
JSAx2cwI/wSlTVC5DzUnGoZ4qyfKHhjf8yIuHR+Ea2PB0ZSlUl28czz3XPXN
cRlv66nxFBdle046Bio7Q7+TZVI1/Sh0MllPci6W946/5syUqNGHFcGf3LfW
BY3qW82gV6bA+7WRTyzq+zFN5fOQqi6rngzF5EuHPZLVBn4wwdKXJHK+Io6/
bQEKr4gHsfmksjkMyQrFpNovZXA3dqedTyMvkPqROvgogLNgy3JC2DLfaufY
MZVgcW+CrOwiTFOqKspnAlLPtavVq9EGIalbsc7UmjkpN5NHhXAwBEgtEY/A
C2+WTiWFcqLls05PpiyPkzdptKEjKvGgQKNKdeZhU+k09eUcCPs9OMtLsOjj
m4Ue8IiEQkSMW9y0q5wQWe0Fbn3vUPZMPf4r7rnVU+QIIuQkmWVbCEOPeBvd
bWXSi5kEmAyao68s2fyMBA+w3yYX1v99WsASs5jSAr6mD5SloY9tKCNhM1Ph
DFCA3t/lyA6CrlozceiDsYKnioYdFVyGoLR0ZTH8bCpKDp0jOg1CMsvgIXkU
HZG47u5U9gsCW52WKuyJlsjLc0qnN5ks7WDRDzySz7hqs5kzlio7fTFae+y4
0EX1iIczxtVIUT0HGQPzuVOqu47PyA5iR7kwp1VakLqVklfpxHLUsxFVWgS+
ZT6z8qKeKS1q9CCcbD4FbkGouAlgSDaaFNdT1kHoR91uAjbTetYx+Q86mE+7
dj2bg9Hy+xVkcKLhhNjd+Pa7b5mw6TITIsXOW3MyyoLFHeE0FuxXhwRIhJhy
uqyCcIdx2GFSYsEs0PqpVWdxuKAYchmtZZ2yYjiOyzYbflBTdcnA9YSNMXrJ
u+KBUQeu2A+rxRhjS7Ph3BTLD3gfM0yzyrqA5IxBVT48bMa6SLhWnV1a3V+N
XJqNsB7etxMKZfzgMndMP6RACyywf8Xg2ktxjiRoInPNa1uNpPZM8ghfVgqm
S1L6VlZiDoLRTYhCD3RsamOtfJP5Lj7eN9ySFKplGblCr9ashPJPBt8l73D+
Rr3N2D3/sZa8Na0+AGTa9AigpHTOofwiGoNiKXlthdBcmD+0dY7QqNOAxCxs
C82TZKFZ38jCAWzlaHmiWNRMji6RnnjTF9NY4OgDTTLpBBp7bKwxD/s9uWUD
5vlQYtlST5VOod25Qw5nhbSMMk8fa6HSnSs6qO62/AxQfxIV5MqKLyqFrZ7b
DFKuLNZ+O0fO2seP59mv7IJ5INlCkz1RfRtvDmsH5yOKbOHYosHU3T5zh95A
4iTeO1YPlZigkirhGM1bsu+40kGSlHCDWJJ59yKaA8nuYm7gGMGhanOhDuqn
/eX4RBaaWnO68a1s1IriNKVKrw8tT3uDOzwgF1E2oGDxbTIgZZZbAj+hTIeL
CT3tgw9eiMGrtbCSv+2yM2PVnTBH4f2feEw5x2qw+5+A1jmKyvE784u+Uo49
3tsRwP/WT11y+Or85haM8smLHyWyGQe5xQoU9WKdqAMTKMN6pOuztS3yfMnM
giJnqH9sOreRYJ7f78o24rdCYux74t6ZNemDbcxWQOLjydVl0ofRMzLCYA0C
4ME8+NSJJjNR28lQZW4gn5N5KvwAZEbym7DsnUoaNqQUcpjsjO/WLjk1oCzA
oWhEJKZPkP1hIxt1iw/4XHr5HXF3+VoZstfqvl1ttdHceDoEdZVfLsVpWLvq
yFI8ne5tjShG0rBy8idSR2kU6REndeBdUryD7Xi8z1ZQCjO4dCJAsVLvYTkQ
Dwo4BD3isdXHSA/TRrAIg87hM6JLJOAOXjjuoiVHXQj7ut1lePn0pVR2KHjT
urUoPVPI2GlxE3dv1ejW1oIeGPtRF1LWHMss7lfK88veIMLmLDfIoXJ50FRi
xJE5zPuBhKeTpmFYnKxhqozUIgyBrl/SAOLLgTkSWfCBzTnDN6oAiPRRS1mL
N1oHx8dLfiizVHQghpWLKjPbQodt7HFCltsDFaMpRbm9M6vWjB/6f8vmpicd
gaRFdChJbXgU/ChPbklLI8VGXGCKl1VmfMnCGA5Yi0q4rakUxZlNAp0tBIka
oE0NnK+sLBExZ+rrFDxfmICFOK3v8TWdtiSMRxLAKEtJEPXomHQfm1EySi7x
arXieaTHW63VCCG9ZIGbPqZNXEafp7XtybFzCRExnRvU3hQzJhwl0tLBwqpp
cnVy7XNq9SJbnSTHeq7BT6jRNJ+vZCvgasvgbPA4iNfhBvX2OxxvuUM/DI+D
bzMVIKIeAi1zVgcGU94mok12ZfOk0aD01gyX+4d07Xfz0LQDRObr5CIYZLVR
mNbBKZjP5Uffq0oIBaDS3i8mZDV54L2MgGMWIn/e6HnXpSBDeU4SZuCnCfEC
jt675SpTDBJ7tdjY3IaT7ohqtqPONDCjlYaQs6g4ZZT8CFXetEUqXSR6kGVu
5OOFG+/EEBJigHVQi5LGC8SM6EKCxidI9sEPIgOpYsvdjCNjEBkELhGW6Q9t
jnPLvlqmaceKZifN1eOfCCBhwAEIL7rUiPRNVBr4F6PkhZKHaB+qWCwH4qSm
S/EX6PppZA8AQDAezs+i6EOPJxwdRCVwM+1vYOgUznJm0tre1c2YAfIkPzMN
5FRRmQB7NZ7ghHaZeqFS2reIuZFYGEoYMAggzaWQ50L2huuU1Jr9e/z06X8f
tf9i8L5megOUpvNzMHcUzrfdkFX3Ek/4cNYF/RIABR/c6AXk/NSxWR0haD0m
c7D1RGp5pSwrh/nbWiUvKYROFuHV6XV91GHM5l5HGUi6DMKzdg2nzOpVFTnJ
lYvI36TwuLMhGYoRH0GNRLKRQ59hNPB7BEe+zUPytge97JzNIr8PDQ4Q5lC/
4rKAU60m8DFaJlxN409/88115Kh4g72Hm2fLIBgTvTIXTSBMfeUfm63aAU18
Y8CfrAEeX05HZ2SFC5iT95x5Y4wenauB33PC+OTxzcGuzoqifLBssanrXpDV
E8VecB9EmjLPIWacjNFr+P4bY+7AJ8Yyu89xCyT7ZZAOsgtCKMmksYdoMnzo
15gJEkOGVcNK6P7sBifk/PpusLGjpBGFuYdK9eNjBhbfRFbJCqj4kPqCg60m
nZWxxVgf2hvdesTQMsrz/0czEuz5qIwtpt7tFUlZv8SYj1sh6F3AHSsofms3
g3ZJDtnS50p/WG5HxtHD24hddmtzoxSkY0n1Zawd+wik7Q2bDbGrCxd1mu0Q
DZrR7Js/hnKdCFDfY0jYgBSGHibJGOz1oZd46GrejRTtKGYZJW/lB8p6kGFt
0y2HfhzgiJ4LhN1z5WpgC5NmaKLEGzDfGa9GxsFULGoJw714v8ppR0R31xM8
FHA9GNhQZuQ61/2GmnELsnH6WLlpEL+zhE1gPr+6POpxIQTIu8Rixjn047h8
7xmrgbmQq2gGuJYueFecsfVQA60j4D0f6r/oFm1hiZ9Ml9k8hY4pWlrWibF2
obCHG3RE1TPsn3CNTZyr4NfvefxWxBpGo/yH3T4Aw4jXJoQ2GWKzIPejclPt
IUcWVKqozFAoNeSJ4/EEkOC4ZfB3TG0QsxsrCXLUoVFYodPuYrKVnedbiskU
PwN1WkvFBAPUeJt78aJRL6wSr+sQRXUxmnaLe9071IIFkZ0vrdKUTE1673HZ
FIbspBWc8VlUfXzZ/9fYtezGcV3BPb9i4E1IYMjICryIgiCh9bYtSpEUx8mu
qWmSbQ2niekZSfQgQH4ju2SZ34j/JF+Se6rO6/Y0lcCAbVHs132cex51qqoA
/m3UsBGTQtvhjv4VrbpCDaMFzqAbxCBPtf3U7CVenqT3JRvyjs4xrV7VLBSp
Ar7bvW4/3UPB5tu1AL2wcMVznWsJD+UkmfRL7osJRot6PX+e59OjcDncSWGS
Iw2mMiV3hSS25h0W7Qc+jXjYiOBg7IcMK6QrhiSoJhC4PeaG6rZaQrFglHls
UF3KFmq3++H0OUQkWILgPCVj7II7ZTWJF4/3nteshfPRsKDgl+ZIvjQvWO+H
rEIl6V3ZWMMgwnJ/iwjRHBAghJiaC7vOwFOyelYaj3AASXxhSQUsVlODJmLf
Dzd/O2duNhcf9u54628qB1sxp1ZtAdviWK9tvBWBaEVNW0CuWB14DEk2tt2S
YrqO14x2g8MgcDnSJgVlusecroKve9k6wJmAgOu2Yj7YbOPniftlAu2urpaq
RQdYFY9PjqHhVscUCeyHSG8nj+fdZLmOB5gFJ8E0rxb7rsmns7Nfvvn+xYi1
HvLEN2WP88h6pC3Vb9HJPQbG24Mk4l0PMlNO3gLcHfYGB0Z1Uz24sO3FFLK/
zdGezKn7qGoG69Vl37zb/aVDN85u92r7o3AJ+5zCdeJakzuERoUIY8fxsdHa
8tmZ73sIBkhfne6Mbm2nJIhg7drsiKKvq+y/w1NQNDWS6p0nwrRzRBmtEk3V
o5u4EC3tfYNiTcgWoI78G3omxllDtogk1OB98PsdT009dzLnyqEwEIm+7j/x
fFRlTUWFIgcVwkWu1XMHyzlpPdFrtMdVKRtBWCDh4Q5Nt7DyKOLYMqrwhsgt
Y5bjjscEqQOVaKL9qJ0sgufhDmzt7V7FSyKlZjw5A/sDLBuiWGFtyu+hRgyX
65Jko9qnq0qt8tqSgYRxPjJqU/08d2RHxIKdhTE5uyDn3t1U3RyBTMCSjv+1
tVvqUsfOssYG8TaJZledSMuG2A5KOGbFYBLwbkC0uUv9VOtiLCmWkc9xTwfu
TBwwE15BNzzQ/KUSQSLZrABB9CH9rhxGIVkv2cJYTbR3ET9vHFUSBWx7zUiT
Guau3e2+b5ZsBfxhy2YK1y+RWMoqpG74teCkeCnuyHSmioS0JOAG50rxT+G+
55SMmLWrVrtUHfFSXsLdJZ2FqtcfDAQ6HWEQzouVfD8+uvh9Dn2yF/SnDS0j
1nK1qHvBi1pvr1ETiBlndzy3u1i6CwEd0R7npR7tPMbDMh7UCm4FcYGbNkk2
pVr4SKtJX7jC+ngvUs6++ycaPlfPqeyIabvuEUnKpqXsWRnC3WZsgKl3fUpB
XaTj2V7jg9RP1v/529+xcoR+dtATsuVFtj7cGqbV7K1AYJJnQte0wVa39XJQ
IAd0UknTu78MKswQMOFREFLnRl4wDvkLYbJW0p/AbteqUOUr8HmZZHlqH002
dxlZv3km45u5+AwYhVrVLd/D0xl+zflSdUjdwbFMjFfp2gk/ZVTCixyB3S58
ALtfOq0UYuD7URb3AKQYaZUjwYAJTE0iE30q9U6fow15sUWu3/pVNE0t2EDv
sLL+InzX6HMUnDsPht9oOlNtAEO5JZm69sHsQArD1X5wS71yHDGLdmQadRPJ
mE3qae56BnOIYoXBeTdKw/oDKvmtNGIGRzRGSWA1KGKpweDo41lKbpU7FR4y
1ZbHtzo5OFVeoJEFyLVh1kupN1PpOptsIym7x29RN4jLID9dNzdXszP6pJ5Y
P3x6diZqr5er1ZdySpX/Qvuj/FiL8dbovuoFOWdicHUGaG+NIl739c/+iEt5
gSFK06uc3E+7HweTzivpTnjlg9me3IZuUaQa5Y3nagNp4LIhNV9FDagzwmoa
2W2DWpQkr6fw3X23J7vyewYoYd2y8EmtGyJ8GwdPOnU6monF8NaIpTwFudtt
lmA60PyqrBgL1sf5xMvKVzF75ys+e27JuEw7JvtvwiKAn+pYjwjfopJa3So9
bd0ec3LQyiOyxqLTqsdxCvS8CaA+SQOZfTSRY4WDLuM3/oi5P1fTQ3bAJ8DF
uQvEoS+ZUIRuk3pEoJ0qWDyNXHDgi4dgTwNahdrWmkfda+aXHeTbw1El/mru
SePiVK/INRiKM0VeIIsEplIWc037AoQpRtT8XUJsBSQsF0uKvRoSkb7W0Osb
6RjyDlZ5odnOt2KhcW5U2ubBLtJ3Z+YAodxSjnpnbdWL24GGQJvCrCCrqIdq
k2aFm/1g6UQJpKvykHwObwDT4YV1Tc5GpDof7+2yodXllq1i1d53y367sOhb
uVROZocKpRBdJKP3mRu+4t1yO2zY2DQSOtS/KXehEP0jDLr3aEtoUlXOuLeH
9nO1MCMesoPw/1xgQvuCtLu05kYrsZMJS70ITT2orbjlB/2f99/AU/pza62t
6T7kVJXqgsXveQEt6vboeWodiIYNuDaxOMy5IwrF9Sju3DgcuPRK5kET5eVJ
XOLIYQZNncLZH0yYVBUoHo1k2mT1OxxI0mN38PMHE02au5TTCfU/JUMLvpag
VFEi2gptnyuXdJ03XWPdEFHKPDmovbTKF5RR2hvEvIiGmYuXtRshu/ER1Vqh
vjxHD+Cq2HbV6rJ65vg+kdvSblLH/GeZbuatNq1Ru3lbQzJ+ulzv2C56Rkn3
B6MttuFkr6De7eJnvejXqhxNwRp2vaKY5+d0398cHOyLZk4z389NFcp4f/Bl
orzRvHNkIsn2TQQEVVRck6gg+CsG4ZV7vG/bG+b404udzL4tP0aNce+lg+Bt
ldp+hZlVBt8T7NRQ6lYTRxDcaiUENLBglkk4OYjEuFkooNXL/d/f/V5GUOkT
gxqEFwIVsjCCJ1GzzK5IpNQTPBs47aeYfG2RKPAHOBrFS5yDJVtOjmuB3K+x
fOL32NolTRVzD9Mjfo81bhq90jX8rif6fex3qA1slbC7uOAXhhq0azvi4+b5
9xWsuiXnG93hO64Vsdml6K001ULC+fnj9vpm1lkfynubWSUJOaZLc37rIuta
u/AeDfcPDMUdRbjw7BWwNQosrQ7ABLKlbLrVoqzA9a2dIWLAKhprQi4dfHZ4
+qc3szdlrl+Utz8KBpH0sKRlauCwKLfcCSu2F4iGz3Jz8aot72X0rOE4lnfF
vpxe5VLqlkOj9RjYH2idngcedLJqTBQGnOEp9EkqaKZ9sSEmLPoC3bYElfEk
K4d9seWaumAoDSdhtaAQCW1wki6AnY7sBAydJjGSKMrraRhNc8mD0rOf1r+Q
eI0S/9Rhd9KeaMcbcYwE8QAmqB92lFnmZQmVPcsmSQObcTMYZU2dFbNEkggV
IfPqosVpYSkVf22dAcF0gB3N8jhxYn38d0+rQXrr/eVciGJwI4q7A5uEQUVU
KTVuFvSUvMkKeMWYHAvEgcKl60abYuovsoSpT3usI0oUQMNLybF17RP+JB2v
01mUdQuF0//19tF3XU9WRfCHTodj043ROzukfLf7rm2pSaoO5UfTUtbDyvlT
jf7ZZ1iZCo2PzXPOGe95cvASFczP2wWoeHrqCJiVEmKCMFKhVmVKwnj42Fcn
OJflJvZ7MRiC13xjx1bdkqJu76J/tzVmQZaAhjrgVT0nbRhVOquzF2JLTY9U
OI1htKr7OVOquZgVZv7shef2zm+j5acJNR/iH7xN4zaIP5G9NmK7IDpSvd7a
qY3Gd/+iXJrwewIIBgKGhnOixLhDGj0VlzR2HzAkRL+VGwiXr6M9iEJmCsDF
Le8yA3fEUkoGjAPYlJW6NXbp3stEenqwCKoEtXu8YY6fp34xvephel14s1Xd
lDW1At5ap5MOjJSYTUbSwFxli3Z2z7VuwuAQwK3H6yL3O3SDzfCNJHvqiqp/
QWJHfntlW3b6++QlBLahFjiY0pWSMcgpnC3Hb6QHs4no6lHSLkJxJ3zcEMjz
VD93qPr8WU/gAc4K5slCvAgMEYRUuRKSu5YKShVbu2CfsiTRpQSheKwL+pWu
jmLlpMHRR2O8Ue8Cwrk4jZZVxycFHVa6kN2BVcvKdXFiLznelajHkfbHhChY
icEkmMUAnmTBIsd8aLYNXKorKp715xfbAeqEogqX8gQqvbAwtQg/iYr7tzqZ
AJrSgQJuVnnlPfyJeujHq1uvAak2ayKdc5VTs/vJpNq2RNagBpEdEYyhjoT2
0DoJnFVprVd+lcbMEvn1VoF/GNTg0hinsQe87Oy3sE0Y/WWBlhTKFGvzL8cb
/PdqeXAFlEBRTlwTfEvSa5445HcBdAIyFRVVLra232uA05bzjN9Gk07eSkF4
FKpwbLuU01c8TOL01JSWL4d//ACeZTlE6WWu2U13rD+gOtfGrQXlvN3vtmGz
CCkb/X3PywQ1bY/0oJ4fclrcnTPgKjCbHiaNGMuc3o10pJqZAUZ/Prsqk78+
dvyZp+A1L+6tq+NamaQh3EtNSHS6JLKSSXk6vr9S6oBvmuYQ44MqalVHsu7F
C13UHldWsUzyUYVr+lJ5hkaKJhwya8mthvoQs6iTeKS1FOaL2OFWOejrblAM
VMyEvpsyV05N52FaOESq6aoFP4lTU6x5otYDNmRqvXJ3uUA2eN8vKtmMUe02
r/cRMSARpWttOcEKuVx3i2OFuMoENbft0MGzTBAc6/ryaIPKNI2M6zO89Cuf
5Zf5wsNnr15Kwuvrbrj/K3KcdMPoFL3sUd933bBiCLz8ghhhPColHJfhHFga
kLkRKubg1XHReoqbeEN1W4+aNmK00QjusA5x8xPzjLsxlvvkZ5Tjf4l0UHJw
PVRKWGMOFdpqtZOlBIkvljEl4XqZvQ+AEL4BjsbaOinjGBDyEoBWJHWsvpX7
WvtNoeJonU6qtjQSRIVP6R4g21wQIlhqs3xLSCyEuREbjcSd9DDj3HAG8pqq
zalhyiHzNQkbptQMbNZ6E5eqdnW1yfbUX6z7rBJp6ZzZzdXuTxcZ7sUQcYx/
xHpwfdSKkjdIwEdpc5dWYNeSgUMzZlCrAvUyqzgoVxCSkrq5shM2SxyeytQH
bng2YmfKfte6WIwzx3bUh0eWyU1lNan0ztF+AMavdCkAW1f01bOsOxko1QHA
Z4QfrJokb5ILfPr8IJHleP1FbdzIoxx5k9HmkNpX5qHIJ/E6eqfliOz4IwIx
PP7uNuPySloaymdTxlTDFGGfP8cwxF8Vg4LlWZ6ErtIkFSLwjhVXkbHCgIND
uHMn71/uxaEcPI7X5m86oBcqpFa3ukh+CZC5/iY69t2KJBY/oUtrJKkvuQnU
reWJKh6lTWQLrx16hiFS+Ex+G1WSS330ymFBShV20Y9JE6/amAuSuBEgV23j
+djLvOOAkzKnY75sjVD8eqnSroa1P+xWIFcu59cwMhpzFI154GAMRN+iG3qq
aOH52mwtuHQOozphjSgIiDCtqYI4CVVKAWyIzyTNRreUIq0ZQJcV+tjSsgMK
p01hvdlcBv4O3bOWJzQP1Z3E/XperXaJ9jdkpvHlPvZLzm9Tkj2v6EETDps+
SjAm5qJPY4Wn3HQ4du5ZYvcAmNRvL6f+N9doT2Y3mXi2mxa9U56ii/Sj+1P0
v/0YtY+apz85intPhMF595nqd4Ps9B81HlBpybj9saJgJ0KUsFgGaGktqKwg
2/L2RsROQ1BMQ+xR2Ue31W531gxMCWIIon0sAqmYt+6y2Hw1RJZV1Hijnjxd
d7596QkR7HRLgsgLkA9dV33aE358tSs3+2xG0/3eDJkCDp0kiPmaaiT8yOG0
kX6pY1hn8CltQS5D9WTdghO53GNoI0COYFKZFU6g0LnUYMbNGtqImnLJebOZ
9H6iyi1dEI4mDCQFJFmNasSTLi5VUhENWHDULZO0qNObsCUbdJmARby0IDe/
Lc0mWnYq8U1zNCIdSfuvIXFFx6YAemwnTFO1r7EAUmdYDCXMFglgF/GFSly/
Fejbxplx1lqrTZ18jsmR+N6ea7AKW6XZs9Fi/4e9nsBy9/AhyxX9hXTys2CW
ICsUAscZOMD/q1wlgMPIEihyX+RDVVZZBoUpK+gDqVFmLCVPtiJXf5fZJuBL
l0H76aopv9KJkLF4N//+x2s2KJjLomZCtQghyVIXft2YycLQzv7VqA/EdADC
X5OYX20MKyNac98yDiWPkHjrCxTV5FQLNuVzPzZnAZ3ntovVq33ANSPshfUV
+cmsWcNNb2TYTINovtHY77tV6iPqWBBOR5O6A1Y9NLxxMZpr7/cwRgAv0Fuh
GB2ufkxaVPqH/s1cX1bHyYqzEFqQmrmwc37sFhtiV1hXVKyIRrmo8pVI8r3T
v7Fj9SofUQOzSrZ47KkVpYAnDwlNC4YEFPzpwVHMFdACSshmWSTP4KC7zxI4
IgMr23uR9ULUE++Gd1KdQgvxWqr2sy4GU5ejgMUckYCGTzXYJp1pd80gQ+YB
vCd8zGBvJ5K1ITYBHn0yIY1rmdkA8e1pdGoCBAYdHjwsulaknp+enYrY2Geq
UVcQ2uNvNq6OeHx8jAoqaUjMBgHTc7B7wPxWu/jtF3Adv/jrXolrmAUcmH1y
hj37wDreiYT5V721deaLG3N6mk7xODJ4pluHGvSiw5+JHddf6Jx+FqeuGmDo
oST+t4tekEw4L9seoaZsMDeyD2bfNVtkhB52zYfmctkVV/hJu+zKzJ+W+S2r
ZvZdWXoiXn9eDOR7kbQr11w114tOBO3PBdHxUByqZV9+6Zt++Plfszfbn/+5
bn86/r6REGY+e1FOxlU/zB4K286yuT5nmP+6Kf7V7E1T4sj57FW7WPfym2XW
y6XfbMurYACeLKVRefZ4AOluPzH03PtyJVnLCTCk9SybDj7/6fPfP3709PEc
oPI8QI+34haWlf3HVRnRXwyzZ8WW/VTW4v179+/Nnsm/j58/fHv81f2ZQASM
UuVHUl0iZyhYdJlHYXbFO636k9mX98o/X/36/n1tzReqebR7h6JMvQwW/Z4r
oSmlGSnt1M/7uikWqPz/w2bVLJrywk8looQ7+FDEwrrlycF/AeHjtbggjAEA

-->

</rfc>

